Description


BullWall Ransomware Containment does not entirely inspect a file to determine if it is ransomware. An authenticated attacker could bypass detection by encrypting a file and leaving the first four bytes unaltered. Versions 4.6.0.0, 4.6.0.6, 4.6.0.7, and 4.6.1.4 were confirmed to be affected; other versions before and after may also be affected.

Related CPE's


Could not find any relations

Weaknesses



CWE-1023

CVSS impact metrics


CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:H/A:H

7.1 · High

  • CVSS V3.1

  • CVSS V3.0

  • CVSS V2.0

Information


Source identifier

9119a7d8-5eab-497f-8521-727c672e3725

Vulnerability status

Awaiting analysis

Published

2025-12-18T21:15:53.800

23 hours ago

Last modified

2025-12-19T18:00:18.330

3 hours ago