CyberHappenings logo

Track cybersecurity events as they unfold. Sourced timelines. Filter, sort, and browse. Fast, privacy‑respecting. No invasive ads, no tracking.

Active Exploitation of Critical Motex Lanscope Endpoint Manager Vulnerability

First reported
Last updated
1 unique sources, 1 articles

Summary

Hide ▲

The U.S. Cybersecurity and Infrastructure Security Agency (CISA) has added a critical security flaw in Motex Lanscope Endpoint Manager to its Known Exploited Vulnerabilities (KEV) catalog. The vulnerability, CVE-2025-61932, allows attackers to execute arbitrary code on affected systems. It impacts on-premises versions of Lanscope Endpoint Manager, specifically the Client program and Detection Agent. The flaw has been actively exploited in the wild, and federal agencies are advised to apply patches by November 12, 2025. The vulnerability impacts versions 9.4.7.1 and earlier. It has been addressed in versions 9.3.2.7, 9.3.3.9, 9.4.0.5, 9.4.1.5, 9.4.2.6, 9.4.3.8, 9.4.4.6, 9.4.5.4, 9.4.6.3, and 9.4.7.3. The exact exploitation methods and threat actors are unknown, but an alert from the Japan Vulnerability Notes (JVN) portal indicates that an unnamed customer received malicious packets targeting this vulnerability.

Timeline

  1. 23.10.2025 08:37 1 articles · 10h ago

    Critical Motex Lanscope Endpoint Manager Vulnerability Exploited in the Wild

    CISA added CVE-2025-61932 to its Known Exploited Vulnerabilities catalog, confirming active exploitation. The flaw impacts on-premises versions of Lanscope Endpoint Manager, allowing arbitrary code execution. Federal agencies are advised to patch by November 12, 2025.

    Show sources

Information Snippets