CVE-2025-62001

BullWall Ransomware Containment supports configurable file and directory exclusions such as '$RECYCLE.BIN' to balance monitoring scope and performance. Certain exclusion patterns could allow an authenticated attacker to rename directories in a way that avoids monitoring. Fixed in 4.6.1.14 and 5.0.0.42, which remove hardcoded exclusion behavior and exposes exclusion handling as configurable settings.
Configurations

Configuration 1 (hide)

OR cpe:2.3:a:bullwall:ransomware_containment:4.6.0.0:*:*:*:*:*:*:*
cpe:2.3:a:bullwall:ransomware_containment:4.6.0.6:*:*:*:*:*:*:*
cpe:2.3:a:bullwall:ransomware_containment:4.6.0.7:*:*:*:*:*:*:*
cpe:2.3:a:bullwall:ransomware_containment:4.6.1.4:*:*:*:*:*:*:*

History

No history.

Information

Published : 2025-12-18 21:15

Updated : 2026-01-15 20:16


NVD link : CVE-2025-62001

Mitre link : CVE-2025-62001

CVE.ORG link : CVE-2025-62001


JSON object : View

Products Affected

bullwall

  • ransomware_containment
CWE
CWE-420

Unprotected Alternate Channel