CVE Vulnerabilities

CVE-2025-62001

Unprotected Alternate Channel

Published: Dec 18, 2025 | Modified: Jan 15, 2026
CVSS 3.x
N/A
Source:
NVD
CVSS 2.x
RedHat/V2
RedHat/V3
Ubuntu
root.io logo minimus.io logo echo.ai logo

BullWall Ransomware Containment supports configurable file and directory exclusions such as $RECYCLE.BIN to balance monitoring scope and performance. Certain exclusion patterns could allow an authenticated attacker to rename directories in a way that avoids monitoring. Fixed in 4.6.1.14 and 5.0.0.42, which remove hardcoded exclusion behavior and exposes exclusion handling as configurable settings.

Weakness

The product protects a primary channel, but it does not use the same level of protection for an alternate channel.

Affected Software

NameVendorStart VersionEnd Version
Ransomware_containmentBullwall4.6.0.0 (including)4.6.0.0 (including)
Ransomware_containmentBullwall4.6.0.6 (including)4.6.0.6 (including)
Ransomware_containmentBullwall4.6.0.7 (including)4.6.0.7 (including)
Ransomware_containmentBullwall4.6.1.4 (including)4.6.1.4 (including)

Potential Mitigations

References