Metrics
Affected Vendors & Products
No advisories yet.
Solution
No solution given by the vendor.
Workaround
No workaround given by the vendor.
Thu, 15 Jan 2026 20:00:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| Description | BullWall Ransomware Containment relies on the number of file modifications to trigger detection. An authenticated attacker could encrypt a single large file without triggering a detection alert if thresholds are configured to require multiple file changes. The number of files to cause a detection alert can be configured by the user. Versions 4.6.0.0, 4.6.0.6, 4.6.0.7, and 4.6.1.4 were confirmed to be affected; other versions before and after may also be affected. | BullWall Ransomware Containment considers the number of files modified to trigger detection. An authenticated attacker could encrypt a single (possibly large) file without triggering detection if thresholds are configured to require multiple file changes. The number of files to trigger detection can be configured by the user. Versions 4.6.0.0, 4.6.0.6, 4.6.0.7, and 4.6.1.4 are affected. Other versions may also be affected. |
| Title | BullWall Ransomware Containment large file encryption | BullWall Ransomware Containment file count detection bypass |
Wed, 14 Jan 2026 22:30:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| References |
|
Wed, 14 Jan 2026 21:30:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| Description | BullWall Ransomware Containment relies on the number of file modifications to trigger detection. An authenticated attacker could encrypt a single large file without triggering a detection alert. Versions 4.6.0.0, 4.6.0.6, 4.6.0.7, and 4.6.1.4 were confirmed to be affected; other versions before and after may also be affected. | BullWall Ransomware Containment relies on the number of file modifications to trigger detection. An authenticated attacker could encrypt a single large file without triggering a detection alert if thresholds are configured to require multiple file changes. The number of files to cause a detection alert can be configured by the user. Versions 4.6.0.0, 4.6.0.6, 4.6.0.7, and 4.6.1.4 were confirmed to be affected; other versions before and after may also be affected. |
Mon, 12 Jan 2026 17:15:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| First Time appeared |
Bullwall
Bullwall ransomware Containment |
|
| CPEs | cpe:2.3:a:bullwall:ransomware_containment:4.6.0.0:*:*:*:*:*:*:* cpe:2.3:a:bullwall:ransomware_containment:4.6.0.6:*:*:*:*:*:*:* cpe:2.3:a:bullwall:ransomware_containment:4.6.0.7:*:*:*:*:*:*:* cpe:2.3:a:bullwall:ransomware_containment:4.6.1.4:*:*:*:*:*:*:* |
|
| Vendors & Products |
Bullwall
Bullwall ransomware Containment |
Thu, 08 Jan 2026 19:15:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| Metrics |
ssvc
|
Fri, 19 Dec 2025 04:00:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| References |
|
Thu, 18 Dec 2025 20:45:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| Description | BullWall Ransomware Containment relies on the number of file modifications to trigger detection. An authenticated attacker could encrypt a single large file without triggering a detection alert. Versions 4.6.0.0, 4.6.0.6, 4.6.0.7, and 4.6.1.4 were confirmed to be affected; other versions before and after may also be affected. | |
| Title | BullWall Ransomware Containment large file encryption | |
| Weaknesses | CWE-358 | |
| References |
| |
| Metrics |
cvssV3_1
|
Projects
Sign in to view the affected projects.
Status: PUBLISHED
Assigner: cisa-cg
Published:
Updated: 2026-01-15T19:51:15.560Z
Reserved: 2025-10-07T14:33:04.481Z
Link: CVE-2025-62002
Updated: 2026-01-08T18:14:53.216Z
Status : Modified
Published: 2025-12-18T21:15:54.093
Modified: 2026-01-15T20:16:04.037
Link: CVE-2025-62002
No data.
OpenCVE Enrichment
No data.