Unrated severityNVD Advisory· Published Dec 18, 2025· Updated Jan 15, 2026
BullWall Server Intrusion Protection (SIP) initialization race condition
CVE-2025-62004
Description
BullWall Server Intrusion Protection (SIP) services are initialized after login services during system startup. A local, authenticated attacker can log in after boot and before SIP MFA is running. The SIP services do not retroactively enforce MFA or disconnect sessions that were not subject to SIP MFA. Versions 4.6.0.0, 4.6.0.6, 4.6.0.7, and 4.6.1.4 are affected. Other versions mayy also be affected. BullWall plans to improve detection method documentation.
Affected products
2- Range: = 4.6.0.0, = 4.6.0.6, = 4.6.0.7, = 4.6.1.4
- BullWall/Server Intrusion Protectionv5Range: 4.6.0.0
Patches
0No patches discovered yet.
Vulnerability mechanics
AI mechanics synthesis has not run for this CVE yet.
References
2- raw.githubusercontent.com/cisagov/CSAF/develop/csaf_files/IT/white/2025/va-25-352-01.jsonmitregovernment-resourcethird-party-advisory
- www.cve.org/CVERecordmitrevdb-entry
News mentions
0No linked articles in our index yet.