Categories: Cyber Security News

LANSCOPE Endpoint Manager Vulnerability Allows Attackers to Execute Remote Code

A critical remote code execution vulnerability has been discovered in the on-premise edition of LANSCOPE Endpoint Manager that allows unauthenticated attackers to run arbitrary commands with high privileges on affected systems.

Tracked as CVE-2025-61932, the flaw impacts both the Client Program (MR) and the Detection Agent (DA) in version 9.4.7.1 and earlier.

Real-world exploit attempts have already been observed, making prompt patching imperative.

Vulnerability Details

Security researchers found that specially crafted network packets sent to computers running the vulnerable on-premise software trigger a severe error in the MR client and DA detection agent.

This error bypasses all user interaction requirements no clicks or email openings are needed granting attackers direct, high-privilege code execution on target machines.

Evidence indicates that malicious packets exploiting this weakness have been delivered to customer networks in live environments.

Only the On-Premise Edition of LANSCOPE Endpoint Manager is affected; the Cloud Edition remains unaffected.

Both core components, Client Program (MR) and Detection Agent (DA), in version 9.4.7.1 and earlier, contain the vulnerability.

Organizations using the on-premise solution face an immediate risk until they apply the update.

A security update addressing this issue is now available on the official LANSCOPE support portal.

Because the vulnerability resides entirely in client-side software, every endpoint running the on-premise edition must be updated.

The patch uses the same procedure as a regular software upgrade for the MR client and DA agent; no manager console upgrade is required.

Administrators should schedule an immediate rollout of the patch and monitor networks for any unusual incoming packets targeting these agents.

CVE Summary Table

CVE ID Product CVSS 3.0 Score
CVE-2025-61932 LANSCOPE Endpoint Manager On-Premise Edition 9.8

Ensure all on-premise client PCs are updated without delay to eliminate the exploitation window presented by this severe flaw.

Cyber Awareness Month Offer: Upskill With 100+ Premium Cybersecurity Courses From EHA's Diamond Membership: Join Today

The post LANSCOPE Endpoint Manager Vulnerability Allows Attackers to Execute Remote Code appeared first on Cyber Security News.

rssfeeds-admin

Recent Posts

Pluralistic: Ada Palmer’s “Inventing the Renaissance” (25 Apr 2026)

Today's links Ada Palmer's "Inventing the Renaissance": A tour-de-force, a magnum opus, a work of…

4 hours ago

This Week’s Awesome Tech Stories From Around the Web (Through April 25)

Future The People Do Not Yearn for AutomationNilay Patel | The Verge “Not everything about…

4 hours ago

AI + Seismic Data: The Secret Behind Faster Oil Discovery

The global energy industry has long depended on seismic data to locate oil and gas…

4 hours ago

How AI and Smart Automation Are Revolutionising Bottle Filling Machines in Modern Manufacturing

Artificial intelligence is quietly transforming every corner of modern industry. From predictive maintenance in heavy…

4 hours ago

AI Is Reshaping How Additive Manufacturing Fits Into Production

Additive manufacturing has always lived in a bit of a gray area. Some see it…

4 hours ago

AI + Seismic Data: The Secret Behind Faster Oil Discovery

The global energy industry has long depended on seismic data to locate oil and gas…

4 hours ago

This website uses cookies.