BullWall Ransomware Containment contains excluded file paths, such as '$recycle.bin' that are not monitored. An attacker with file write permissions could bypass detection by renaming a directory. Versions 4.6.0.0, 4.6.0.6, 4.6.0.7, and 4.6.1.4 were confirmed to be affected; other versions before and after may also be affected.
Metrics
Affected Vendors & Products
References
History
Mon, 12 Jan 2026 17:15:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| First Time appeared |
Bullwall
Bullwall ransomware Containment |
|
| CPEs | cpe:2.3:a:bullwall:ransomware_containment:4.6.0.0:*:*:*:*:*:*:* cpe:2.3:a:bullwall:ransomware_containment:4.6.0.6:*:*:*:*:*:*:* cpe:2.3:a:bullwall:ransomware_containment:4.6.0.7:*:*:*:*:*:*:* cpe:2.3:a:bullwall:ransomware_containment:4.6.1.4:*:*:*:*:*:*:* |
|
| Vendors & Products |
Bullwall
Bullwall ransomware Containment |
Thu, 08 Jan 2026 19:15:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| Metrics |
ssvc
|
Fri, 19 Dec 2025 04:00:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| References |
|
Thu, 18 Dec 2025 20:45:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| Description | BullWall Ransomware Containment contains excluded file paths, such as '$recycle.bin' that are not monitored. An attacker with file write permissions could bypass detection by renaming a directory. Versions 4.6.0.0, 4.6.0.6, 4.6.0.7, and 4.6.1.4 were confirmed to be affected; other versions before and after may also be affected. | |
| Title | BullWall Ransomware Containment hard-coded folder exclusions | |
| Weaknesses | CWE-420 | |
| References |
| |
| Metrics |
cvssV3_1
|
Status: PUBLISHED
Assigner: cisa-cg
Published: 2025-12-18T20:32:21.620Z
Updated: 2026-01-08T18:14:11.297Z
Reserved: 2025-10-07T14:33:04.481Z
Link: CVE-2025-62001
Updated: 2026-01-08T18:14:04.919Z
Status : Analyzed
Published: 2025-12-18T21:15:53.953
Modified: 2026-01-12T17:14:06.497
Link: CVE-2025-62001
No data.