U.S. CISA adds Motex LANSCOPE flaw to its Known Exploited Vulnerabilities catalog
好的,我现在需要帮用户总结这篇文章的内容,控制在100字以内。首先,我得通读整篇文章,抓住主要信息。 文章讲的是美国CISA机构将Motex LANSCOPE的一个漏洞加入到已知被利用的漏洞目录中。这个漏洞的编号是CVE-2025-61932,CVSS评分是9.3,属于高危。漏洞类型是通信通道来源验证不当,允许攻击者通过特制数据包执行任意代码。 影响的版本是9.4.7.1及更早版本,修复版本有多个。CISA要求联邦机构在2025年11月12日前修复,并建议私营组织也检查和修复这个漏洞。 接下来,我需要把这些信息浓缩到100字以内。重点包括:CISA添加了哪个漏洞,漏洞的严重性,影响范围以及修复要求。 可能会这样组织语言:“美国CISA将Motex LANSCOPE的CVE-2025-61932漏洞(CVSS 9.3)加入已知被利用目录。该漏洞源于通信源验证不当,允许攻击者通过特制数据包执行任意代码。影响版本9.4.7.1及以下,修复版本已发布。CISA要求联邦机构于2025年11月前修复。” 检查一下字数是否在限制内,并确保所有关键点都涵盖到了。 </think> 美国网络安全和基础设施安全局(CISA)将Motex LANSCOPE中的CVE-2025-61932漏洞(CVSS v4评分9.3)加入已知被利用的漏洞目录。该漏洞源于通信源验证不当,允许攻击者通过特制数据包执行任意代码。影响版本9.4.7.1及以下,修复版本已发布。CISA要求联邦机构于2025年11月前修复此漏洞以保护网络免受攻击。 2025-10-23 10:49:52 Author: securityaffairs.com(查看原文) 阅读量:23 收藏

U.S. CISA adds Motex LANSCOPE flaw to its Known Exploited Vulnerabilities catalog

U.S. Cybersecurity and Infrastructure Security Agency (CISA) adds Motex LANSCOPE flaw to its Known Exploited Vulnerabilities catalog.

The U.S. Cybersecurity and Infrastructure Security Agency (CISA) added a Motex LANSCOPE flaw, tracked as CVE-2025-61932 (CVSS v4 score of 9.3), to its Known Exploited Vulnerabilities (KEV) catalog.

The flaw is an improper verification of source of a communication channel vulnerability that allows an attacker to execute arbitrary code by sending specially crafted packets.

A flaw in the on-premises client and detection agent of Lanscope Endpoint Manager allows remote code execution via specially crafted packets due to improper request origin validation.

“Motex LANSCOPE Endpoint Manager contains an improper verification of source of a communication channel vulnerability allowing an attacker to execute arbitrary code by sending specially crafted packets.” reads the advisory.

The vulnerability impacts versions 9.4.7.1 and earlier. The following versions address the flaw:

  • 9.3.2.7
  • 9.3.3.9
  • 9.4.0.5
  • 9.4.1.5
  • 9.4.2.6
  • 9.4.3.8
  • 9.4.4.6
  • 9.4.5.4
  • 9.4.6.3, and
  • 9.4.7.3

According to Binding Operational Directive (BOD) 22-01: Reducing the Significant Risk of Known Exploited Vulnerabilities, FCEB agencies have to address the identified vulnerabilities by the due date to protect their networks against attacks exploiting the flaws in the catalog.

Experts also recommend that private organizations review the Catalog and address the vulnerabilities in their infrastructure.

CISA orders federal agencies to fix the vulnerabilities by November 12, 2025.

Follow me on Twitter: @securityaffairs and Facebook and Mastodon

Pierluigi Paganini

(SecurityAffairs – hacking, CISA)




文章来源: https://securityaffairs.com/183768/breaking-news/u-s-cisa-adds-motex-lanscope-flaw-to-its-known-exploited-vulnerabilities-catalog.html
如有侵权请联系:admin#unsafe.sh