Metrics
Affected Vendors & Products
No advisories yet.
Solution
No solution given by the vendor.
Workaround
No workaround given by the vendor.
Wed, 14 Jan 2026 22:30:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| References |
|
Wed, 14 Jan 2026 21:30:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| Description | BullWall Ransomware Containment does not entirely inspect a file to determine if it is ransomware. An authenticated attacker could bypass detection by encrypting a file and leaving the first four bytes unaltered. Versions 4.6.0.0, 4.6.0.6, 4.6.0.7, and 4.6.1.4 were confirmed to be affected; other versions before and after may also be affected. | BullWall Ransomware Containment may not always detect an encrypted file. This issue affects a specific file inspection method that evaluates file content based on header bytes. An authenticated attacker could encrypt files, preserving the first four bytes and preventing this particular method from triggering. The affected product implements additional integrity-based detection mechanisms capable of identifying file corruption or encryption for some common file extensions independent of header bytes. As a result, this vulnerability does not represent a complete bypass of ransomware detection, but a limitation of one detection method when evaluated independently. Versions 4.6.0.0, 4.6.0.6, 4.6.0.7, and 4.6.1.4 are affected. Other versions may also be affected. BullWall plans to improve detection method documentation. |
Mon, 12 Jan 2026 17:15:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| First Time appeared |
Bullwall
Bullwall ransomware Containment |
|
| CPEs | cpe:2.3:a:bullwall:ransomware_containment:4.6.0.0:*:*:*:*:*:*:* cpe:2.3:a:bullwall:ransomware_containment:4.6.0.6:*:*:*:*:*:*:* cpe:2.3:a:bullwall:ransomware_containment:4.6.0.7:*:*:*:*:*:*:* cpe:2.3:a:bullwall:ransomware_containment:4.6.1.4:*:*:*:*:*:*:* |
|
| Vendors & Products |
Bullwall
Bullwall ransomware Containment |
Fri, 19 Dec 2025 04:00:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| References |
|
Thu, 18 Dec 2025 21:15:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| Metrics |
ssvc
|
Thu, 18 Dec 2025 20:45:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| Description | BullWall Ransomware Containment does not entirely inspect a file to determine if it is ransomware. An authenticated attacker could bypass detection by encrypting a file and leaving the first four bytes unaltered. Versions 4.6.0.0, 4.6.0.6, 4.6.0.7, and 4.6.1.4 were confirmed to be affected; other versions before and after may also be affected. | |
| Title | BullWall Ransomware Containment incomplete file inspection | |
| Weaknesses | CWE-1023 | |
| References |
| |
| Metrics |
cvssV3_1
|
Projects
Sign in to view the affected projects.
Status: PUBLISHED
Assigner: cisa-cg
Published:
Updated: 2026-01-15T19:50:39.114Z
Reserved: 2025-10-07T14:33:04.481Z
Link: CVE-2025-62000
Updated: 2025-12-18T20:39:34.320Z
Status : Modified
Published: 2025-12-18T21:15:53.800
Modified: 2026-01-14T22:15:50.893
Link: CVE-2025-62000
No data.
OpenCVE Enrichment
No data.