Description
BullWall Ransomware Containment does not entirely inspect a file to determine if it is ransomware. An authenticated attacker could bypass detection by encrypting a file and leaving the first four bytes unaltered. Versions 4.6.0.0, 4.6.0.6, 4.6.0.7, and 4.6.1.4 were confirmed to be affected; other versions before and after may also be affected.
Related CPE's
Could not find any relations
References
CVSS impact metrics
CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:H/A:H
7.1 · High
CVSS V3.1
CVSS V3.0
CVSS V2.0
Information
Source identifier
9119a7d8-5eab-497f-8521-727c672e3725
Vulnerability status
Awaiting analysis
Published
2025-12-18T21:15:53.800
23 hours agoLast modified
2025-12-19T18:00:18.330
3 hours ago