SHARE
Facebook X Pinterest WhatsApp

CISA Flags Critical Lanscope Bug

CISA urges immediate patching for critical Lanscope flaw.

Oct 23, 2025
eSecurity Planet content and product recommendations are editorially independent. We may make money when you click on links to our partners. Learn More

The Cybersecurity and Infrastructure Security Agency (CISA) has issued an alert regarding a critical vulnerability in Motex Lanscope Endpoint Manager.

CISA is directing all federal agencies to apply available patches or mitigate affected systems by November 12, 2025, to protect against potential compromise.

While the scope and method of exploitation remain uncertain, Motex has confirmed through the Japan Vulnerability Notes (JVN) portal that a customer received a malicious packet linked to this vulnerability.

A threat to endpoint security

Motex disclosed the vulnerability, tracked as CVE-2025-61932, which carries a CVSS v4 score of 9.3.

The flaw exists in the on-premises versions of Lanscope Endpoint Manager’s Client program and Detection Agent.

According to CISA, the vulnerability results from improper verification of the source of a communication channel, which could allow a remote attacker to execute arbitrary code by sending specially crafted packets.

This weakness effectively gives attackers the ability to run unauthorized code on vulnerable systems, potentially leading to data theft, ransomware infections, or complete network compromise.

Because Lanscope Endpoint Manager is widely used to monitor and manage enterprise endpoints, exploitation could have far-reaching effects on corporate and government infrastructures.

Motex’s response

Motex has released security updates addressing the vulnerability in multiple product versions, including 9.3.2.7, 9.3.3.9, 9.4.0.5, 9.4.1.5, 9.4.2.6, 9.4.3.8, 9.4.4.6, 9.4.5.4, 9.4.6.3, and 9.4.7.3.

Systems running version 9.4.7.1 or earlier remain vulnerable and should be updated immediately.

Immediate actions to secure vulnerable systems

To mitigate the risks associated with CVE-2025-61932, organizations should take immediate action to strengthen defenses and reduce exposure, including:

  • Apply patches and verify updates: Upgrade to version 9.4.7.3 or later and ensure all systems, including backups, are patched.
  • Restrict and secure network access: Implement zero-trust and limit Lanscope access to trusted, authenticated users only.
  • Monitor and audit continuously: Implement IDS/IPS, track unusual traffic, and regularly review logs and configurations for anomalies.
  • Strengthen access control and response readiness: Enforce least privilege and MFA, and maintain a tested incident response (IR) plan.

By prioritizing these actions, organizations can reduce their attack surface and improve cyber resilience.

The exploitation of CVE-2025-61932 underscores the importance of layered defenses and timely patch management in enterprise environments.

Because endpoint management systems like Lanscope hold privileged access across networks, their compromise can grant attackers wide-reaching control.

By maintaining strong patching, network segmentation, monitoring, and access controls, organizations can defend against emerging threats.

Recommended for you...

Russian Hackers Pivot Fast With New “ROBOT” Malware Chain
Denial of Fuzzing: Rust-Safe Code Triggers Kernel Crashes in Windows
Ken Underhill
Oct 17, 2025
Microsoft Warns: Ransomware Powers Most Cyberattacks
Ken Underhill
Oct 17, 2025
North Korean Hackers Use Blockchain to Hide Crypto-Stealing Malware
Ken Underhill
Oct 17, 2025
eSecurity Planet Logo

eSecurity Planet is a leading resource for IT professionals at large enterprises who are actively researching cybersecurity vendors and latest trends. eSecurity Planet focuses on providing instruction for how to approach common security challenges, as well as informational deep-dives about advanced cybersecurity topics.

Property of TechnologyAdvice. © 2025 TechnologyAdvice. All Rights Reserved

Advertiser Disclosure: Some of the products that appear on this site are from companies from which TechnologyAdvice receives compensation. This compensation may impact how and where products appear on this site including, for example, the order in which they appear. TechnologyAdvice does not include all companies or all types of products available in the marketplace.