CVE-2024-46480

An NTLM hash leak in Venki Supravizio BPM up to 18.0.1 allows authenticated attackers with Application Administrator access to escalate privileges on the underlying host system.
Configurations

Configuration 1 (hide)

cpe:2.3:a:venki:supravizio_bpm:*:*:*:*:*:*:*:*

History

03 Oct 2025, 13:42

Type Values Removed Values Added
Summary
  • (es) Una fuga de hash NTLM en Venki Supravizio BPM hasta 18.0.1 permite a atacantes autenticados con acceso de administrador de aplicaciones escalar privilegios en el sistema host subyacente .
References () https://github.com/Lorenzo-de-Sa/Vulnerability-Research - () https://github.com/Lorenzo-de-Sa/Vulnerability-Research - Third Party Advisory
References () https://github.com/Lorenzo-de-Sa/Vulnerability-Research/blob/main/CVE-2024-46480.md - () https://github.com/Lorenzo-de-Sa/Vulnerability-Research/blob/main/CVE-2024-46480.md - Third Party Advisory
References () https://www.venki.com.br/ferramenta-bpm/supravizio/ - () https://www.venki.com.br/ferramenta-bpm/supravizio/ - Product
CPE cpe:2.3:a:venki:supravizio_bpm:*:*:*:*:*:*:*:*
First Time Venki
Venki supravizio Bpm

13 Jan 2025, 20:15

Type Values Removed Values Added
New CVE

Information

Published : 2025-01-13 20:15

Updated : 2025-10-03 13:42


NVD link : CVE-2024-46480

Mitre link : CVE-2024-46480

CVE.ORG link : CVE-2024-46480


JSON object : View

Products Affected

venki

  • supravizio_bpm
CWE
CWE-522

Insufficiently Protected Credentials