CVE-2025-62004

BullWall Server Intrusion Protection (SIP) services are initialized after login services during system startup. A local, authenticated attacker can log in after boot and before SIP MFA is running. The SIP services do not retroactively enforce MFA or disconnect sessions that were not subject to SIP MFA. Versions 4.6.0.0, 4.6.0.6, 4.6.0.7, and 4.6.1.4 are affected. Other versions mayy also be affected. BullWall plans to improve detection method documentation.
Configurations

Configuration 1 (hide)

OR cpe:2.3:a:bullwall:server_intrusion_protection:4.6.0.0:*:*:*:*:*:*:*
cpe:2.3:a:bullwall:server_intrusion_protection:4.6.0.6:*:*:*:*:*:*:*
cpe:2.3:a:bullwall:server_intrusion_protection:4.6.0.7:*:*:*:*:*:*:*
cpe:2.3:a:bullwall:server_intrusion_protection:4.6.1.4:*:*:*:*:*:*:*

History

15 Jan 2026, 20:16

Type Values Removed Values Added
Summary (en) BullWall Server Intrusion Protection services are initialized after login services during system startup. An authenticated attacker with administrative permissions can log in after boot and bypass MFA. SIP service does not retroactively enforce the challenge or disconnect unauthenticated sessions. Versions 4.6.0.0, 4.6.0.6, 4.6.0.7, and 4.6.1.4 were confirmed to be affected; other versions before and after may also be affected. BullWall plans to improve detection method documentation. (en) BullWall Server Intrusion Protection (SIP) services are initialized after login services during system startup. A local, authenticated attacker can log in after boot and before SIP MFA is running. The SIP services do not retroactively enforce MFA or disconnect sessions that were not subject to SIP MFA. Versions 4.6.0.0, 4.6.0.6, 4.6.0.7, and 4.6.1.4 are affected. Other versions mayy also be affected. BullWall plans to improve detection method documentation.
CVSS v2 : unknown
v3 : 6.6
v2 : unknown
v3 : 7.5

14 Jan 2026, 22:15

Type Values Removed Values Added
References
  • {'url': 'https://raw.githubusercontent.com/cisagov/CSAF/develop/csaf_files/IT/white/2025/VA-25-352-01.json', 'tags': ['Broken Link'], 'source': '9119a7d8-5eab-497f-8521-727c672e3725'}
  • () https://raw.githubusercontent.com/cisagov/CSAF/develop/csaf_files/IT/white/2025/va-25-352-01.json - Broken Link
Summary (en) BullWall Server Intrusion Protection services are initialized after login services. An authenticated attacker with administrative permissions can log in after boot and bypass MFA. SIP service does not retroactively enforce the challenge or disconnect unauthenticated sessions. Versions 4.6.0.0, 4.6.0.6, 4.6.0.7, and 4.6.1.4 were confirmed to be affected; other versions before and after may also be affected. (en) BullWall Server Intrusion Protection services are initialized after login services during system startup. An authenticated attacker with administrative permissions can log in after boot and bypass MFA. SIP service does not retroactively enforce the challenge or disconnect unauthenticated sessions. Versions 4.6.0.0, 4.6.0.6, 4.6.0.7, and 4.6.1.4 were confirmed to be affected; other versions before and after may also be affected. BullWall plans to improve detection method documentation.
CVSS v2 : unknown
v3 : 6.2
v2 : unknown
v3 : 6.6

12 Jan 2026, 17:15

Type Values Removed Values Added
First Time Bullwall server Intrusion Protection
Bullwall
CPE cpe:2.3:a:bullwall:server_intrusion_protection:4.6.0.7:*:*:*:*:*:*:*
cpe:2.3:a:bullwall:server_intrusion_protection:4.6.0.0:*:*:*:*:*:*:*
cpe:2.3:a:bullwall:server_intrusion_protection:4.6.1.4:*:*:*:*:*:*:*
cpe:2.3:a:bullwall:server_intrusion_protection:4.6.0.6:*:*:*:*:*:*:*
References () https://raw.githubusercontent.com/cisagov/CSAF/develop/csaf_files/IT/white/2025/VA-25-352-01.json - () https://raw.githubusercontent.com/cisagov/CSAF/develop/csaf_files/IT/white/2025/VA-25-352-01.json - Broken Link
References () https://www.cve.org/CVERecord?id=CVE-2025-62004 - () https://www.cve.org/CVERecord?id=CVE-2025-62004 - Third Party Advisory

18 Dec 2025, 21:15

Type Values Removed Values Added
New CVE

Information

Published : 2025-12-18 21:15

Updated : 2026-01-15 20:16


NVD link : CVE-2025-62004

Mitre link : CVE-2025-62004

CVE.ORG link : CVE-2025-62004


JSON object : View

Products Affected

bullwall

  • server_intrusion_protection
CWE
CWE-367

Time-of-check Time-of-use (TOCTOU) Race Condition