CVE Vulnerabilities

CVE-2025-62002

Improperly Implemented Security Check for Standard

Published: Dec 18, 2025 | Modified: Jan 15, 2026
CVSS 3.x
8.1
HIGH
Source:
NVD
CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:H/A:H
CVSS 2.x
RedHat/V2
RedHat/V3
Ubuntu
root.io logo minimus.io logo echo.ai logo

BullWall Ransomware Containment considers the number of files modified to trigger detection. An authenticated attacker could encrypt a single (possibly large) file without triggering detection if thresholds are configured to require multiple file changes. The number of files to trigger detection can be configured by the user. Versions 4.6.0.0, 4.6.0.6, 4.6.0.7, and 4.6.1.4 are affected. Other versions may also be affected.

Weakness

The product does not implement or incorrectly implements one or more security-relevant checks as specified by the design of a standardized algorithm, protocol, or technique.

Affected Software

NameVendorStart VersionEnd Version
Ransomware_containmentBullwall4.6.0.0 (including)4.6.0.0 (including)
Ransomware_containmentBullwall4.6.0.6 (including)4.6.0.6 (including)
Ransomware_containmentBullwall4.6.0.7 (including)4.6.0.7 (including)
Ransomware_containmentBullwall4.6.1.4 (including)4.6.1.4 (including)

References