Home

Description

BullWall Ransomware Containment relies on the number of file modifications to trigger detection. An authenticated attacker could encrypt a single large file without triggering a detection alert. Versions 4.6.0.0, 4.6.0.6, 4.6.0.7, and 4.6.1.4 were confirmed to be affected; other versions before and after may also be affected.

PUBLISHED Reserved 2025-10-07 | Published 2025-12-18 | Updated 2025-12-19 | Assigner cisa-cg




MEDIUM: 4.3CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:L/A:N
MEDIUM: 5.3CVSS:4.0/AV:N/AC:L/AT:N/PR:L/UI:N/VC:N/VI:L/VA:N/SC:N/SI:N/SA:N

Problem types

CWE-358 Improperly Implemented Security Check for Standard

Product status

Default status
unknown

4.6.0.0 (custom) before *
affected

Credits

Alexander Nikolaj Fischer

References

raw.githubusercontent.com/...IT/white/2025/va-25-352-01.json (url)

www.cve.org/CVERecord?id=CVE-2025-62002 (url)

cve.org (CVE-2025-62002)

nvd.nist.gov (CVE-2025-62002)

Download JSON

Data based on CVE®. Copyright © 1999-2025, The MITRE Corporation. All rights reserved.