Vulnerability Description
BullWall Ransomware Containment supports configurable file and directory exclusions such as '$RECYCLE.BIN' to balance monitoring scope and performance. Certain exclusion patterns could allow an authenticated attacker to rename directories in a way that avoids monitoring. Fixed in 4.6.1.14 and 5.0.0.42, which remove hardcoded exclusion behavior and exposes exclusion handling as configurable settings.
CVSS Score
HIGH
Affected Products
| Vendor | Product | Versions |
|---|---|---|
| Bullwall | Ransomware Containment | 4.6.0.0 |
Related Weaknesses (CWE)
References
- https://raw.githubusercontent.com/cisagov/CSAF/develop/csaf_files/IT/white/2025/Broken Link
- https://www.cve.org/CVERecord?id=CVE-2025-62001Third Party Advisory
FAQ
What is CVE-2025-62001?
CVE-2025-62001 is a vulnerability with a CVSS score of 8.8 (HIGH). BullWall Ransomware Containment supports configurable file and directory exclusions such as '$RECYCLE.BIN' to balance monitoring scope and performance. Certain exclusion patterns could allow an authen...
How severe is CVE-2025-62001?
CVE-2025-62001 has been rated HIGH with a CVSS base score of 8.8/10. Review the CVSS metrics above for detailed severity breakdown.
Is there a patch for CVE-2025-62001?
Check the references section above for vendor advisories and patch information. Affected products include: Bullwall Ransomware Containment.