BullWall Ransomware Containment supports configurable file and directory exclusions such as '$RECYCLE.BIN' to balance monitoring scope and performance. Certain exclusion patterns could allow an authenticated attacker to rename directories in a way that avoids monitoring. Fixed in 4.6.1.14 and 5.0.0.42, which remove hardcoded exclusion behavior and exposes exclusion handling as configurable settings.
Advisories

No advisories yet.

Fixes

Solution

No solution given by the vendor.


Workaround

No workaround given by the vendor.

History

Fri, 16 Jan 2026 05:00:00 +0900

Type Values Removed Values Added
Description BullWall Ransomware Containment supports configurable file and directory exclusions such as '$recycle.bin' to balance monitoring scope and performance. Certain exclusion patterns could allow an authenticated attacker with file-write permissions to rename directories in a way that avoids monitoring. Fixed in 4.6.1.14 and 5.0.0.42, which removes hardcoded exclusion behavior and exposes exclusion handling as configurable settings. BullWall Ransomware Containment supports configurable file and directory exclusions such as '$RECYCLE.BIN' to balance monitoring scope and performance. Certain exclusion patterns could allow an authenticated attacker to rename directories in a way that avoids monitoring. Fixed in 4.6.1.14 and 5.0.0.42, which remove hardcoded exclusion behavior and exposes exclusion handling as configurable settings.

Thu, 15 Jan 2026 07:30:00 +0900


Thu, 15 Jan 2026 06:30:00 +0900

Type Values Removed Values Added
Description BullWall Ransomware Containment contains excluded file paths, such as '$recycle.bin' that are not monitored. An attacker with file write permissions could bypass detection by renaming a directory. Versions 4.6.0.0, 4.6.0.6, 4.6.0.7, and 4.6.1.4 were confirmed to be affected; other versions before and after may also be affected. BullWall Ransomware Containment supports configurable file and directory exclusions such as '$recycle.bin' to balance monitoring scope and performance. Certain exclusion patterns could allow an authenticated attacker with file-write permissions to rename directories in a way that avoids monitoring. Fixed in 4.6.1.14 and 5.0.0.42, which removes hardcoded exclusion behavior and exposes exclusion handling as configurable settings.

Tue, 13 Jan 2026 02:15:00 +0900

Type Values Removed Values Added
First Time appeared Bullwall
Bullwall ransomware Containment
CPEs cpe:2.3:a:bullwall:ransomware_containment:4.6.0.0:*:*:*:*:*:*:*
cpe:2.3:a:bullwall:ransomware_containment:4.6.0.6:*:*:*:*:*:*:*
cpe:2.3:a:bullwall:ransomware_containment:4.6.0.7:*:*:*:*:*:*:*
cpe:2.3:a:bullwall:ransomware_containment:4.6.1.4:*:*:*:*:*:*:*
Vendors & Products Bullwall
Bullwall ransomware Containment

Fri, 09 Jan 2026 04:15:00 +0900

Type Values Removed Values Added
Metrics ssvc

{'options': {'Automatable': 'no', 'Exploitation': 'poc', 'Technical Impact': 'total'}, 'version': '2.0.3'}


Fri, 19 Dec 2025 13:00:00 +0900


Fri, 19 Dec 2025 05:45:00 +0900

Type Values Removed Values Added
Description BullWall Ransomware Containment contains excluded file paths, such as '$recycle.bin' that are not monitored. An attacker with file write permissions could bypass detection by renaming a directory. Versions 4.6.0.0, 4.6.0.6, 4.6.0.7, and 4.6.1.4 were confirmed to be affected; other versions before and after may also be affected.
Title BullWall Ransomware Containment hard-coded folder exclusions
Weaknesses CWE-420
References
Metrics cvssV3_1

{'score': 8.8, 'vector': 'CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H'}

cvssV4_0

{'score': 8.7, 'vector': 'CVSS:4.0/AV:N/AC:L/AT:N/PR:L/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N'}


Projects

Sign in to view the affected projects.

cve-icon MITRE

Status: PUBLISHED

Assigner: cisa-cg

Published:

Updated: 2026-01-15T19:51:00.410Z

Reserved: 2025-10-07T14:33:04.481Z

Link: CVE-2025-62001

cve-icon Vulnrichment

Updated: 2026-01-08T18:14:04.919Z

cve-icon NVD

Status : Modified

Published: 2025-12-18T21:15:53.953

Modified: 2026-01-15T20:16:03.913

Link: CVE-2025-62001

cve-icon Redhat

No data.

cve-icon OpenCVE Enrichment

No data.

Weaknesses