SHARE
Facebook X Pinterest WhatsApp

CISA Flags Critical Lanscope Bug

CISA urges immediate patching for critical Lanscope flaw.

Oct 23, 2025
eSecurity Planet content and product recommendations are editorially independent. We may make money when you click on links to our partners. Learn More

The Cybersecurity and Infrastructure Security Agency (CISA) has issued an alert regarding a critical vulnerability in Motex Lanscope Endpoint Manager.

CISA is directing all federal agencies to apply available patches or mitigate affected systems by November 12, 2025, to protect against potential compromise.

While the scope and method of exploitation remain uncertain, Motex has confirmed through the Japan Vulnerability Notes (JVN) portal that a customer received a malicious packet linked to this vulnerability.

A threat to endpoint security

Motex disclosed the vulnerability, tracked as CVE-2025-61932, which carries a CVSS v4 score of 9.3.

The flaw exists in the on-premises versions of Lanscope Endpoint Manager’s Client program and Detection Agent.

According to CISA, the vulnerability results from improper verification of the source of a communication channel, which could allow a remote attacker to execute arbitrary code by sending specially crafted packets.

This weakness effectively gives attackers the ability to run unauthorized code on vulnerable systems, potentially leading to data theft, ransomware infections, or complete network compromise.

Because Lanscope Endpoint Manager is widely used to monitor and manage enterprise endpoints, exploitation could have far-reaching effects on corporate and government infrastructures.

Motex’s response

Motex has released security updates addressing the vulnerability in multiple product versions, including 9.3.2.7, 9.3.3.9, 9.4.0.5, 9.4.1.5, 9.4.2.6, 9.4.3.8, 9.4.4.6, 9.4.5.4, 9.4.6.3, and 9.4.7.3.

Systems running version 9.4.7.1 or earlier remain vulnerable and should be updated immediately.

Immediate actions to secure vulnerable systems

To mitigate the risks associated with CVE-2025-61932, organizations should take immediate action to strengthen defenses and reduce exposure, including:

  • Apply patches and verify updates: Upgrade to version 9.4.7.3 or later and ensure all systems, including backups, are patched.
  • Restrict and secure network access: Implement zero-trust and limit Lanscope access to trusted, authenticated users only.
  • Monitor and audit continuously: Implement IDS/IPS, track unusual traffic, and regularly review logs and configurations for anomalies.
  • Strengthen access control and response readiness: Enforce least privilege and MFA, and maintain a tested incident response (IR) plan.

By prioritizing these actions, organizations can reduce their attack surface and improve cyber resilience.

The exploitation of CVE-2025-61932 underscores the importance of layered defenses and timely patch management in enterprise environments.

Because endpoint management systems like Lanscope hold privileged access across networks, their compromise can grant attackers wide-reaching control.

By maintaining strong patching, network segmentation, monitoring, and access controls, organizations can defend against emerging threats.

Recommended for you...

Command Execution Risk Found in Cacti’s SNMP Handling
Ken Underhill
Dec 5, 2025
New Splunk Windows Flaw Enables Privilege Escalation Attacks
Ken Underhill
Dec 5, 2025
Arizona Sues Temu Over Covert Data Harvesting Claims
Ken Underhill
Dec 5, 2025
Is Indonesia’s Gambling Empire a Front for State Cyber Activity?
Ken Underhill
Dec 5, 2025
eSecurity Planet Logo

eSecurity Planet is a leading resource for IT professionals at large enterprises who are actively researching cybersecurity vendors and latest trends. eSecurity Planet focuses on providing instruction for how to approach common security challenges, as well as informational deep-dives about advanced cybersecurity topics.

Property of TechnologyAdvice. © 2025 TechnologyAdvice. All Rights Reserved

Advertiser Disclosure: Some of the products that appear on this site are from companies from which TechnologyAdvice receives compensation. This compensation may impact how and where products appear on this site including, for example, the order in which they appear. TechnologyAdvice does not include all companies or all types of products available in the marketplace.