Home

Description

BullWall Ransomware Containment does not entirely inspect a file to determine if it is ransomware. An authenticated attacker could bypass detection by encrypting a file and leaving the first four bytes unaltered. Versions 4.6.0.0, 4.6.0.6, 4.6.0.7, and 4.6.1.4 were confirmed to be affected; other versions before and after may also be affected.

PUBLISHED Reserved 2025-10-07 | Published 2025-12-18 | Updated 2025-12-19 | Assigner cisa-cg




HIGH: 7.1CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:H/A:H
MEDIUM: 6.9CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:H/VA:H/SC:N/SI:N/SA:N

Problem types

CWE-1023 Incomplete Comparison with Missing Factors

Product status

Default status
unknown

4.6.0.0 (custom) before *
affected

Credits

Alexander Nikolaj Fischer

References

raw.githubusercontent.com/...IT/white/2025/va-25-352-01.json (url)

www.cve.org/CVERecord?id=CVE-2025-62000 (url)

cve.org (CVE-2025-62000)

nvd.nist.gov (CVE-2025-62000)

Download JSON

Data based on CVE®. Copyright © 1999-2025, The MITRE Corporation. All rights reserved.