CVE-2025-62002

BullWall Ransomware Containment considers the number of files modified to trigger detection. An authenticated attacker could encrypt a single (possibly large) file without triggering detection if thresholds are configured to require multiple file changes. The number of files to trigger detection can be configured by the user. Versions 4.6.0.0, 4.6.0.6, 4.6.0.7, and 4.6.1.4 are affected. Other versions may also be affected.
Configurations

Configuration 1 (hide)

OR cpe:2.3:a:bullwall:ransomware_containment:4.6.0.0:*:*:*:*:*:*:*
cpe:2.3:a:bullwall:ransomware_containment:4.6.0.6:*:*:*:*:*:*:*
cpe:2.3:a:bullwall:ransomware_containment:4.6.0.7:*:*:*:*:*:*:*
cpe:2.3:a:bullwall:ransomware_containment:4.6.1.4:*:*:*:*:*:*:*

History

15 Jan 2026, 20:16

Type Values Removed Values Added
Summary (en) BullWall Ransomware Containment relies on the number of file modifications to trigger detection. An authenticated attacker could encrypt a single large file without triggering a detection alert if thresholds are configured to require multiple file changes. The number of files to cause a detection alert can be configured by the user. Versions 4.6.0.0, 4.6.0.6, 4.6.0.7, and 4.6.1.4 were confirmed to be affected; other versions before and after may also be affected. (en) BullWall Ransomware Containment considers the number of files modified to trigger detection. An authenticated attacker could encrypt a single (possibly large) file without triggering detection if thresholds are configured to require multiple file changes. The number of files to trigger detection can be configured by the user. Versions 4.6.0.0, 4.6.0.6, 4.6.0.7, and 4.6.1.4 are affected. Other versions may also be affected.

14 Jan 2026, 22:15

Type Values Removed Values Added
References
  • {'url': 'https://raw.githubusercontent.com/cisagov/CSAF/develop/csaf_files/IT/white/2025/VA-25-352-01.json', 'tags': ['Broken Link'], 'source': '9119a7d8-5eab-497f-8521-727c672e3725'}
  • () https://raw.githubusercontent.com/cisagov/CSAF/develop/csaf_files/IT/white/2025/va-25-352-01.json - Broken Link
Summary (en) BullWall Ransomware Containment relies on the number of file modifications to trigger detection. An authenticated attacker could encrypt a single large file without triggering a detection alert. Versions 4.6.0.0, 4.6.0.6, 4.6.0.7, and 4.6.1.4 were confirmed to be affected; other versions before and after may also be affected. (en) BullWall Ransomware Containment relies on the number of file modifications to trigger detection. An authenticated attacker could encrypt a single large file without triggering a detection alert if thresholds are configured to require multiple file changes. The number of files to cause a detection alert can be configured by the user. Versions 4.6.0.0, 4.6.0.6, 4.6.0.7, and 4.6.1.4 were confirmed to be affected; other versions before and after may also be affected.

12 Jan 2026, 17:14

Type Values Removed Values Added
First Time Bullwall ransomware Containment
Bullwall
References () https://raw.githubusercontent.com/cisagov/CSAF/develop/csaf_files/IT/white/2025/VA-25-352-01.json - () https://raw.githubusercontent.com/cisagov/CSAF/develop/csaf_files/IT/white/2025/VA-25-352-01.json - Broken Link
References () https://www.cve.org/CVERecord?id=CVE-2025-62002 - () https://www.cve.org/CVERecord?id=CVE-2025-62002 - Third Party Advisory
CPE cpe:2.3:a:bullwall:ransomware_containment:4.6.0.7:*:*:*:*:*:*:*
cpe:2.3:a:bullwall:ransomware_containment:4.6.0.6:*:*:*:*:*:*:*
cpe:2.3:a:bullwall:ransomware_containment:4.6.1.4:*:*:*:*:*:*:*
cpe:2.3:a:bullwall:ransomware_containment:4.6.0.0:*:*:*:*:*:*:*

18 Dec 2025, 21:15

Type Values Removed Values Added
New CVE

Information

Published : 2025-12-18 21:15

Updated : 2026-01-15 20:16


NVD link : CVE-2025-62002

Mitre link : CVE-2025-62002

CVE.ORG link : CVE-2025-62002


JSON object : View

Products Affected

bullwall

  • ransomware_containment
CWE
CWE-358

Improperly Implemented Security Check for Standard