BullWall Server Intrusion Protection (SIP) services are initialized after login services during system startup. A local, authenticated attacker can log in after boot and before SIP MFA is running. The SIP services do not retroactively enforce MFA or disconnect sessions that were not subject to SIP MFA. Versions 4.6.0.0, 4.6.0.6, 4.6.0.7, and 4.6.1.4 are affected. Other versions mayy also be affected. BullWall plans to improve detection method documentation.
References
| Link | Resource |
|---|---|
| https://raw.githubusercontent.com/cisagov/CSAF/develop/csaf_files/IT/white/2025/va-25-352-01.json | Broken Link |
| https://www.cve.org/CVERecord?id=CVE-2025-62004 | Third Party Advisory |
Configurations
Configuration 1 (hide)
|
History
No history.
Information
Published : 2025-12-18 21:15
Updated : 2026-01-15 20:16
NVD link : CVE-2025-62004
Mitre link : CVE-2025-62004
CVE.ORG link : CVE-2025-62004
JSON object : View
Products Affected
bullwall
- server_intrusion_protection
CWE
CWE-367
Time-of-check Time-of-use (TOCTOU) Race Condition
