Логотип exploitDog
Консоль
Логотип exploitDog

exploitDog

github логотип

GHSA-cv2v-p23m-2q4h

Опубликовано: 18 дек. 2025
Источник: github
Github: Не прошло ревью
CVSS4: 6.9
CVSS3: 7.1

Описание

BullWall Ransomware Containment does not entirely inspect a file to determine if it is ransomware. An authenticated attacker could bypass detection by encrypting a file and leaving the first four bytes unaltered. Versions 4.6.0.0, 4.6.0.6, 4.6.0.7, and 4.6.1.4 were confirmed to be affected; other versions before and after may also be affected.

BullWall Ransomware Containment does not entirely inspect a file to determine if it is ransomware. An authenticated attacker could bypass detection by encrypting a file and leaving the first four bytes unaltered. Versions 4.6.0.0, 4.6.0.6, 4.6.0.7, and 4.6.1.4 were confirmed to be affected; other versions before and after may also be affected.

EPSS

Процентиль: 2%
0.00014
Низкий

6.9 Medium

CVSS4

7.1 High

CVSS3

Дефекты

CWE-1023

Связанные уязвимости

CVSS3: 7.1
nvd
около 2 месяцев назад

BullWall Ransomware Containment may not always detect an encrypted file. This issue affects a specific file inspection method that evaluates file content based on header bytes. An authenticated attacker could encrypt files, preserving the first four bytes and preventing this particular method from triggering. The affected product implements additional integrity-based detection mechanisms capable of identifying file corruption or encryption for some common file extensions independent of header bytes. As a result, this vulnerability does not represent a complete bypass of ransomware detection, but a limitation of one detection method when evaluated independently. Versions 4.6.0.0, 4.6.0.6, 4.6.0.7, and 4.6.1.4 are affected. Other versions may also be affected. BullWall plans to improve detection method documentation.

EPSS

Процентиль: 2%
0.00014
Низкий

6.9 Medium

CVSS4

7.1 High

CVSS3

Дефекты

CWE-1023