Critical Lanscope Endpoint Manager Bug Exploited in Ongoing Cyberattacks, CISA Confirms
美国网络安全机构CISA将Motex Lanscope Endpoint Manager的一个高危漏洞(CVE-2025-61932)加入已知被利用漏洞目录。该漏洞影响本地版本客户端和检测代理程序,可被用于远程代码执行。多个修复版本已发布。日本公告显示某客户收到可疑恶意包。CISA建议相关机构于2025年11月前完成修复以保护网络。 2025-10-23 05:37:0 Author: thehackernews.com(查看原文) 阅读量:25 收藏

Vulnerability / Threat Intelligence

The U.S. Cybersecurity and Infrastructure Security Agency (CISA) on Wednesday added a critical security flaw impacting Motex Lanscope Endpoint Manager to its Known Exploited Vulnerabilities (KEV) catalog, stating it has been actively exploited in the wild.

The vulnerability, CVE-2025-61932 (CVSS v4 score: 9.3), impacts on-premises versions of Lanscope Endpoint Manager, specifically Client program and Detection Agent, and could allow attackers to execute arbitrary code on susceptible systems.

"Motex LANSCOPE Endpoint Manager contains an improper verification of source of a communication channel vulnerability, allowing an attacker to execute arbitrary code by sending specially crafted packets," CISA said.

CIS Build Kits

The flaw impacts versions 9.4.7.1 and earlier. It has been addressed in the versions below -

  • 9.3.2.7
  • 9.3.3.9
  • 9.4.0.5
  • 9.4.1.5
  • 9.4.2.6
  • 9.4.3.8
  • 9.4.4.6
  • 9.4.5.4
  • 9.4.6.3, and
  • 9.4.7.3

It's currently not known how the vulnerability is being exploited in real-world attacks, who is behind them, or the scale of such efforts. However, an alert issued by the Japan Vulnerability Notes (JVN) portal earlier this week noted that Motex has confirmed an unnamed customer "received a malicious packet suspected to target this vulnerability."

In light of active exploitation efforts, Federal Civilian Executive Branch (FCEB) agencies are recommended to remediate CVE-2025-61932 by November 12, 2025, to safeguard their networks.

Found this article interesting? Follow us on Google News, Twitter and LinkedIn to read more exclusive content we post.


文章来源: https://thehackernews.com/2025/10/critical-lanscope-endpoint-manager-bug.html
如有侵权请联系:admin#unsafe.sh