BullWall Ransomware Containment considers the number of files modified to trigger detection. An authenticated attacker could encrypt a single (possibly large) file without triggering detection if thresholds are configured to require multiple file changes. The number of files to trigger detection can be configured by the user. Versions 4.6.0.0, 4.6.0.6, 4.6.0.7, and 4.6.1.4 are affected. Other versions may also be affected.
References
| Link | Resource |
|---|---|
| https://raw.githubusercontent.com/cisagov/CSAF/develop/csaf_files/IT/white/2025/va-25-352-01.json | Broken Link |
| https://www.cve.org/CVERecord?id=CVE-2025-62002 | Third Party Advisory |
Configurations
Configuration 1 (hide)
|
History
No history.
Information
Published : 2025-12-18 21:15
Updated : 2026-01-15 20:16
NVD link : CVE-2025-62002
Mitre link : CVE-2025-62002
CVE.ORG link : CVE-2025-62002
JSON object : View
Products Affected
bullwall
- ransomware_containment
CWE
CWE-358
Improperly Implemented Security Check for Standard
