CVE-2024-46480
📋 TL;DR
This vulnerability allows authenticated attackers with Application Administrator access in Venki Supravizio BPM to leak NTLM hashes, enabling privilege escalation on the underlying host system. It affects organizations using Venki Supravizio BPM up to version 18.0.1. Attackers must already have administrative access to the application to exploit this vulnerability.
💻 Affected Systems
- Venki Supravizio BPM
📦 What is this software?
⚠️ Risk & Real-World Impact
Worst Case
Full domain compromise through NTLM relay attacks or hash cracking leading to complete system takeover and lateral movement across the network.
Likely Case
Local privilege escalation on the host system where Supravizio BPM is installed, potentially gaining SYSTEM/root privileges.
If Mitigated
Limited to application-level access without host system compromise if proper network segmentation and credential protection are implemented.
🎯 Exploit Status
Exploitation requires authenticated Application Administrator access and knowledge of the specific vulnerability mechanism. The GitHub references contain research details but not full exploit code.
🛠️ Fix & Mitigation
✅ Official Fix
Patch Version: Version 18.0.2 or later
Vendor Advisory: https://www.venki.com.br/ferramenta-bpm/supravizio/
Restart Required: No
Instructions:
1. Contact Venki support for the latest patched version. 2. Backup your Supravizio BPM configuration and data. 3. Install the updated version following vendor instructions. 4. Verify the installation and test application functionality.
🔧 Temporary Workarounds
Restrict Application Administrator Access
allLimit the number of users with Application Administrator role to only essential personnel and implement strict access controls.
Implement Network Segmentation
allIsolate the Supravizio BPM server from critical systems to limit lateral movement if NTLM hashes are compromised.
🧯 If You Can't Patch
- Implement strict monitoring of Application Administrator account activity and NTLM authentication attempts.
- Enable SMB signing and disable NTLMv1 to make hash relay attacks more difficult if hashes are leaked.
🔍 How to Verify
Check if Vulnerable:
Check your Supravizio BPM version via the application interface or configuration files. Versions 18.0.1 and earlier are vulnerable.
Check Version:
Check application web interface or consult Supravizio BPM documentation for version checking commands specific to your installation.
Verify Fix Applied:
After updating, verify the version number shows 18.0.2 or later in the application interface or configuration.
📡 Detection & Monitoring
Log Indicators:
- Unusual Application Administrator account activity
- Multiple failed authentication attempts followed by successful admin login
- Unexpected NTLM authentication events from the Supravizio server
Network Indicators:
- Unusual SMB or NTLM traffic originating from the Supravizio server
- Authentication attempts to multiple systems using NTLM from a single source
SIEM Query:
source="supravizio_logs" AND (event_type="admin_login" OR event_type="authentication") | stats count by user, src_ip