BullWall Server Intrusion Protection (SIP) services are initialized after login services during system startup. A local, authenticated attacker can log in after boot and before SIP MFA is running. The SIP services do not retroactively enforce MFA or disconnect sessions that were not subject to SIP MFA. Versions 4.6.0.0, 4.6.0.6, 4.6.0.7, and 4.6.1.4 are affected. Other versions mayy also be affected. BullWall plans to improve detection method documentation.
References
| Link | Resource |
|---|---|
| https://raw.githubusercontent.com/cisagov/CSAF/develop/csaf_files/IT/white/2025/va-25-352-01.json | Broken Link |
| https://www.cve.org/CVERecord?id=CVE-2025-62004 | Third Party Advisory |
Configurations
Configuration 1 (hide)
|
History
15 Jan 2026, 20:16
| Type | Values Removed | Values Added |
|---|---|---|
| Summary | (en) BullWall Server Intrusion Protection (SIP) services are initialized after login services during system startup. A local, authenticated attacker can log in after boot and before SIP MFA is running. The SIP services do not retroactively enforce MFA or disconnect sessions that were not subject to SIP MFA. Versions 4.6.0.0, 4.6.0.6, 4.6.0.7, and 4.6.1.4 are affected. Other versions mayy also be affected. BullWall plans to improve detection method documentation. | |
| CVSS |
v2 : v3 : |
v2 : unknown
v3 : 7.5 |
14 Jan 2026, 22:15
| Type | Values Removed | Values Added |
|---|---|---|
| References |
|
|
| Summary | (en) BullWall Server Intrusion Protection services are initialized after login services during system startup. An authenticated attacker with administrative permissions can log in after boot and bypass MFA. SIP service does not retroactively enforce the challenge or disconnect unauthenticated sessions. Versions 4.6.0.0, 4.6.0.6, 4.6.0.7, and 4.6.1.4 were confirmed to be affected; other versions before and after may also be affected. BullWall plans to improve detection method documentation. | |
| CVSS |
v2 : v3 : |
v2 : unknown
v3 : 6.6 |
12 Jan 2026, 17:15
| Type | Values Removed | Values Added |
|---|---|---|
| First Time |
Bullwall server Intrusion Protection
Bullwall |
|
| CPE | cpe:2.3:a:bullwall:server_intrusion_protection:4.6.0.7:*:*:*:*:*:*:* cpe:2.3:a:bullwall:server_intrusion_protection:4.6.0.0:*:*:*:*:*:*:* cpe:2.3:a:bullwall:server_intrusion_protection:4.6.1.4:*:*:*:*:*:*:* cpe:2.3:a:bullwall:server_intrusion_protection:4.6.0.6:*:*:*:*:*:*:* |
|
| References | () https://raw.githubusercontent.com/cisagov/CSAF/develop/csaf_files/IT/white/2025/VA-25-352-01.json - Broken Link | |
| References | () https://www.cve.org/CVERecord?id=CVE-2025-62004 - Third Party Advisory |
18 Dec 2025, 21:15
| Type | Values Removed | Values Added |
|---|---|---|
| New CVE |
Information
Published : 2025-12-18 21:15
Updated : 2026-01-15 20:16
NVD link : CVE-2025-62004
Mitre link : CVE-2025-62004
CVE.ORG link : CVE-2025-62004
JSON object : View
Products Affected
bullwall
- server_intrusion_protection
CWE
CWE-367
Time-of-check Time-of-use (TOCTOU) Race Condition
