Home

Description

BullWall Ransomware Containment contains excluded file paths, such as '$recycle.bin' that are not monitored. An attacker with file write permissions could bypass detection by renaming a directory. Versions 4.6.0.0, 4.6.0.6, 4.6.0.7, and 4.6.1.4 were confirmed to be affected; other versions before and after may also be affected.

PUBLISHED Reserved 2025-10-07 | Published 2025-12-18 | Updated 2025-12-19 | Assigner cisa-cg




HIGH: 8.8CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H
HIGH: 8.7CVSS:4.0/AV:N/AC:L/AT:N/PR:L/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N

Problem types

CWE-420 Unprotected Alternate Channel

Product status

Default status
unknown

4.6.0.0 (custom) before *
affected

Credits

Alexander Nikolaj Fischer

References

raw.githubusercontent.com/...IT/white/2025/va-25-352-01.json (url)

www.cve.org/CVERecord?id=CVE-2025-62001 (url)

cve.org (CVE-2025-62001)

nvd.nist.gov (CVE-2025-62001)

Download JSON

Data based on CVE®. Copyright © 1999-2025, The MITRE Corporation. All rights reserved.