CVE-2024-43574

8.3 HIGH

📋 TL;DR

This vulnerability in Microsoft Speech API (SAPI) allows remote attackers to execute arbitrary code on affected systems by sending specially crafted requests. It affects systems running vulnerable versions of Windows with SAPI enabled. Successful exploitation could lead to complete system compromise.

💻 Affected Systems

Products:
  • Microsoft Windows
Versions: Windows 10, Windows 11, Windows Server 2019, Windows Server 2022
Operating Systems: Windows
Default Config Vulnerable: ⚠️ Yes
Notes: Systems with Microsoft Speech API enabled are vulnerable. SAPI is commonly used by accessibility features, voice recognition software, and some enterprise applications.

📦 What is this software?

⚠️ Risk & Real-World Impact

🔴

Worst Case

Full system compromise with administrative privileges, data exfiltration, ransomware deployment, and lateral movement across the network.

🟠

Likely Case

Initial foothold for attackers leading to privilege escalation, credential theft, and installation of backdoors or malware.

🟢

If Mitigated

Limited impact due to network segmentation, application control policies, and restricted user privileges preventing lateral movement.

🌐 Internet-Facing: MEDIUM
🏢 Internal Only: HIGH

🎯 Exploit Status

Public PoC: ✅ No
Weaponized: UNKNOWN
Unauthenticated Exploit: ⚠️ Yes
Complexity: MEDIUM

Microsoft has rated this as 'Exploitation More Likely' in their advisory. The vulnerability requires the attacker to send specially crafted data to the SAPI service.

🛠️ Fix & Mitigation

✅ Official Fix

Patch Version: July 2024 security updates (KB5040442 for Windows 10, KB5040437 for Windows 11, etc.)

Vendor Advisory: https://msrc.microsoft.com/update-guide/vulnerability/CVE-2024-43574

Restart Required: Yes

Instructions:

1. Apply the July 2024 Windows security updates from Windows Update. 2. For enterprise environments, deploy updates via WSUS, SCCM, or Intune. 3. Restart systems after patch installation.

🔧 Temporary Workarounds

Disable SAPI service

windows

Disable the Microsoft Speech API service to prevent exploitation

sc config "SpeechService" start= disabled
sc stop "SpeechService"

Block SAPI network ports

windows

Block network access to SAPI service ports using firewall rules

netsh advfirewall firewall add rule name="Block SAPI" dir=in action=block protocol=TCP localport=1024-65535 program="%SystemRoot%\System32\Speech\SpeechService.exe"
netsh advfirewall firewall add rule name="Block SAPI UDP" dir=in action=block protocol=UDP localport=1024-65535 program="%SystemRoot%\System32\Speech\SpeechService.exe"

🧯 If You Can't Patch

  • Implement network segmentation to isolate systems with SAPI enabled
  • Apply strict application control policies to prevent unauthorized code execution

🔍 How to Verify

Check if Vulnerable:

Check if July 2024 security updates are installed via 'wmic qfe list' or 'systeminfo' command

Check Version:

wmic service where "name='SpeechService'" get name,pathname,startmode,state

Verify Fix Applied:

Verify KB5040442 (Windows 10) or KB5040437 (Windows 11) is installed and SpeechService is running version 10.0.19041.4651 or later

📡 Detection & Monitoring

Log Indicators:

  • Event ID 4688 with SpeechService.exe parent process
  • Unusual network connections to SpeechService.exe
  • Failed SpeechService authentication attempts

Network Indicators:

  • Unusual traffic to/from SpeechService.exe on non-standard ports
  • Suspicious SAPI protocol requests

SIEM Query:

source="windows" (event_id=4688 AND process_name="SpeechService.exe") OR (event_id=4625 AND process_name="SpeechService.exe")

🔗 References

📤 Share & Export