{"dataType":"CVE_RECORD","dataVersion":"5.2","cveMetadata":{"cveId":"CVE-2025-62004","assignerOrgId":"9119a7d8-5eab-497f-8521-727c672e3725","state":"PUBLISHED","assignerShortName":"cisa-cg","dateReserved":"2025-10-07T14:33:04.482Z","datePublished":"2025-12-18T20:36:13.123Z","dateUpdated":"2026-01-15T19:51:45.196Z"},"containers":{"cna":{"descriptions":[{"lang":"en","value":"BullWall Server Intrusion Protection (SIP) services are initialized after login services during system startup. A local, authenticated attacker can log in after boot and before SIP MFA is running. The SIP services do not retroactively enforce MFA or disconnect sessions that were not subject to SIP MFA. Versions 4.6.0.0, 4.6.0.6, 4.6.0.7, and 4.6.1.4 are affected. Other versions mayy also be affected. BullWall plans to improve detection method documentation."}],"affected":[{"vendor":"BullWall","product":"Server Intrusion Protection","defaultStatus":"unknown","versions":[{"version":"4.6.0.0","status":"affected","lessThan":"*","versionType":"custom"}]}],"problemTypes":[{"descriptions":[{"description":"CWE-367 Time-of-check Time-of-use (TOCTOU) Race Condition","lang":"en","type":"CWE","cweId":"CWE-367"}]}],"metrics":[{"cvssV4_0":{"version":"4.0","baseScore":7.7,"attackVector":"NETWORK","baseSeverity":"HIGH","vectorString":"CVSS:4.0/AV:N/AC:L/AT:P/PR:L/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N","userInteraction":"NONE","attackComplexity":"LOW","attackRequirements":"PRESENT","privilegesRequired":"LOW","subIntegrityImpact":"NONE","vulnIntegrityImpact":"HIGH","subAvailabilityImpact":"NONE","vulnAvailabilityImpact":"HIGH","subConfidentialityImpact":"NONE","vulnConfidentialityImpact":"HIGH"}},{"cvssV3_1":{"scope":"UNCHANGED","version":"3.1","baseScore":7.5,"attackVector":"NETWORK","baseSeverity":"HIGH","vectorString":"CVSS:3.1/AV:N/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H","integrityImpact":"HIGH","userInteraction":"NONE","attackComplexity":"HIGH","availabilityImpact":"HIGH","privilegesRequired":"LOW","confidentialityImpact":"HIGH"}},{"other":{"type":"ssvc","content":{"timestamp":"2025-12-18T19:52:16.584817Z","id":"CVE-2025-62004","options":[{"Exploitation":"none"},{"Automatable":"no"},{"Technical Impact":"total"}],"role":"CISA Coordinator","version":"2.0.3"}}}],"title":"BullWall Server Intrusion Protection (SIP) initialization race condition","references":[{"name":"url","url":"https://raw.githubusercontent.com/cisagov/CSAF/develop/csaf_files/IT/white/2025/va-25-352-01.json","tags":["government-resource","third-party-advisory"]},{"name":"url","url":"https://www.cve.org/CVERecord?id=CVE-2025-62004","tags":["vdb-entry"]}],"credits":[{"value":"Alexander Nikolaj Fischer","lang":"en"}],"datePublic":"2025-12-18T00:00:00.000Z","providerMetadata":{"orgId":"9119a7d8-5eab-497f-8521-727c672e3725","shortName":"cisa-cg","dateUpdated":"2026-01-15T19:51:45.196Z"}},"adp":[{"metrics":[{"other":{"type":"ssvc","content":{"timestamp":"2026-01-08T18:15:51.168934Z","id":"CVE-2025-62004","options":[{"Exploitation":"none"},{"Automatable":"no"},{"Technical Impact":"total"}],"role":"CISA Coordinator","version":"2.0.3"}}}],"title":"CISA ADP Vulnrichment","providerMetadata":{"orgId":"134c704f-9b21-4f2e-91b3-4a467353bcc0","shortName":"CISA-ADP","dateUpdated":"2026-01-08T18:16:01.269Z"}}]}}