Article Details
Scrape Timestamp (UTC): 2025-10-23 05:39:43.490
Source: https://thehackernews.com/2025/10/critical-lanscope-endpoint-manager-bug.html
Original Article Text
Click to Toggle View
Critical Lanscope Endpoint Manager Bug Exploited in Ongoing Cyberattacks, CISA Confirms. The U.S. Cybersecurity and Infrastructure Security Agency (CISA) on Wednesday added a critical security flaw impacting Motex Lanscope Endpoint Manager to its Known Exploited Vulnerabilities (KEV) catalog, stating it has been actively exploited in the wild. The vulnerability, CVE-2025-61932 (CVSS v4 score: 9.3), impacts on-premises versions of Lanscope Endpoint Manager, specifically Client program and Detection Agent, and could allow attackers to execute arbitrary code on susceptible systems. "Motex LANSCOPE Endpoint Manager contains an improper verification of source of a communication channel vulnerability, allowing an attacker to execute arbitrary code by sending specially crafted packets," CISA said. The flaw impacts versions 9.4.7.1 and earlier. It has been addressed in the versions below - It's currently not known how the vulnerability is being exploited in real-world attacks, who is behind them, or the scale of such efforts. However, an alert issued by the Japan Vulnerability Notes (JVN) portal earlier this week noted that Motex has confirmed an unnamed customer "received a malicious packet suspected to target this vulnerability." In light of active exploitation efforts, Federal Civilian Executive Branch (FCEB) agencies are recommended to remediate CVE-2025-61932 by November 12, 2025, to safeguard their networks.
Daily Brief Summary
CISA has added CVE-2025-61932, a critical Lanscope Endpoint Manager flaw, to its Known Exploited Vulnerabilities catalog, indicating active exploitation in the wild.
The vulnerability affects on-premises Lanscope Endpoint Manager versions, allowing arbitrary code execution through specially crafted packets.
Impacted versions include 9.4.7.1 and earlier, with the flaw stemming from improper verification of communication channels.
Motex has confirmed at least one customer received a malicious packet targeting this vulnerability, though the attack's scale and perpetrators remain unknown.
Federal Civilian Executive Branch agencies are advised to remediate the vulnerability by November 12, 2025, to protect their systems.
The vulnerability's CVSS v4 score of 9.3 underscores its critical nature, necessitating immediate attention and patching from affected organizations.
Organizations should prioritize updating to patched versions to mitigate potential risks associated with this security flaw.