BullWall Ransomware Containment considers the number of files modified to trigger detection. An authenticated attacker could encrypt a single (possibly large) file without triggering detection if thresholds are configured to require multiple file changes. The number of files to trigger detection can be configured by the user. Versions 4.6.0.0, 4.6.0.6, 4.6.0.7, and 4.6.1.4 are affected. Other versions may also be affected.
References
| Link | Resource |
|---|---|
| https://raw.githubusercontent.com/cisagov/CSAF/develop/csaf_files/IT/white/2025/va-25-352-01.json | Broken Link |
| https://www.cve.org/CVERecord?id=CVE-2025-62002 | Third Party Advisory |
Configurations
Configuration 1 (hide)
|
History
15 Jan 2026, 20:16
| Type | Values Removed | Values Added |
|---|---|---|
| Summary | (en) BullWall Ransomware Containment considers the number of files modified to trigger detection. An authenticated attacker could encrypt a single (possibly large) file without triggering detection if thresholds are configured to require multiple file changes. The number of files to trigger detection can be configured by the user. Versions 4.6.0.0, 4.6.0.6, 4.6.0.7, and 4.6.1.4 are affected. Other versions may also be affected. |
14 Jan 2026, 22:15
| Type | Values Removed | Values Added |
|---|---|---|
| References |
|
|
| Summary | (en) BullWall Ransomware Containment relies on the number of file modifications to trigger detection. An authenticated attacker could encrypt a single large file without triggering a detection alert if thresholds are configured to require multiple file changes. The number of files to cause a detection alert can be configured by the user. Versions 4.6.0.0, 4.6.0.6, 4.6.0.7, and 4.6.1.4 were confirmed to be affected; other versions before and after may also be affected. |
12 Jan 2026, 17:14
| Type | Values Removed | Values Added |
|---|---|---|
| First Time |
Bullwall ransomware Containment
Bullwall |
|
| References | () https://raw.githubusercontent.com/cisagov/CSAF/develop/csaf_files/IT/white/2025/VA-25-352-01.json - Broken Link | |
| References | () https://www.cve.org/CVERecord?id=CVE-2025-62002 - Third Party Advisory | |
| CPE | cpe:2.3:a:bullwall:ransomware_containment:4.6.0.7:*:*:*:*:*:*:* cpe:2.3:a:bullwall:ransomware_containment:4.6.0.6:*:*:*:*:*:*:* cpe:2.3:a:bullwall:ransomware_containment:4.6.1.4:*:*:*:*:*:*:* cpe:2.3:a:bullwall:ransomware_containment:4.6.0.0:*:*:*:*:*:*:* |
18 Dec 2025, 21:15
| Type | Values Removed | Values Added |
|---|---|---|
| New CVE |
Information
Published : 2025-12-18 21:15
Updated : 2026-01-15 20:16
NVD link : CVE-2025-62002
Mitre link : CVE-2025-62002
CVE.ORG link : CVE-2025-62002
JSON object : View
Products Affected
bullwall
- ransomware_containment
CWE
CWE-358
Improperly Implemented Security Check for Standard
