Categories: Cyber Security News

LANSCOPE Endpoint Manager Vulnerability Let Attackers Execute Remote Code

Motex has disclosed a severe remote code execution vulnerability in its LANSCOPE Endpoint Manager On-Premise Edition. Assigned CVE-2025-61932, the flaw carries a CVSS 3.0 score of 9.8, classifying it as an emergency-level threat.

This vulnerability could allow attackers to execute arbitrary code on affected systems, potentially leading to full compromise of endpoint devices.

The issue resides in the product’s Client Program (MR) and Detection Agent (DA), components responsible for managing and monitoring endpoint security.

According to Motex’s announcement, versions up to 9.4.7.1 are vulnerable. Importantly, the cloud-based edition remains unaffected, sparing users of the SaaS version from immediate risk.

However, the on-premise deployment, popular among organizations seeking greater control over their IT environments, now faces urgent scrutiny.

LANSCOPE Endpoint Manager Vulnerability

What elevates the alarm is evidence of active exploitation. Motex reports confirmed instances where customers’ environments received malicious packets from external sources.

Attackers appear to target the client-side programs remotely, exploiting weaknesses that bypass typical network defenses.

Security researchers speculate that this could stem from improper input validation in the detection and management protocols, though full technical details await independent analysis.

This vulnerability underscores broader risks in endpoint management tools, which often run with elevated privileges. Once exploited, adversaries could deploy malware, steal sensitive data, or pivot deeper into corporate networks.

Given the high CVSS score driven by its network accessibility, low complexity, and lack of privileges or user interaction required organizations using affected versions should prioritize remediation.

Motex has promptly released a fix, accessible via their customer support portal, LANSCOPE PORTAL. The update targets client PCs exclusively; the central manager does not require upgrading.

Deployment follows standard procedures, making it straightforward for IT teams to roll out across endpoints. As of August 2025, when the advisory was issued, no widespread breaches have been publicly linked to this CVE, but the confirmed malicious activity signals potential for rapid escalation.

Cybersecurity experts urge immediate patching to mitigate risks, especially in hybrid work setups where endpoints connect remotely.

Follow us on Google News, LinkedIn, and X for daily cybersecurity updates. Contact us to feature your stories.

The post LANSCOPE Endpoint Manager Vulnerability Let Attackers Execute Remote Code appeared first on Cyber Security News.

rssfeeds-admin

Recent Posts

The Overwatch Foundation helps schools thwart hackers, protect student data

A hacker infiltrating the local high school doesn’t sound like much of a threat in…

3 minutes ago

NH Supreme Court sides with Logan Clegg, orders reconsideration of warrantless evidence in Concord double murder case

The New Hampshire Supreme Court ordered a lower court to reexamine Logan Clegg’s attempt to…

4 minutes ago

603 Bar-B-Q moving to Loudon Road, beginning wholesale business

At the end of Loudon Road by Exit 3 sits an abandoned red restaurant abutting…

4 minutes ago

Sunshine Week: NH casinos, more than sheer luck, decide which charities win big

St. Paul’s School, one of the state’s most elite college-preparatory institutions, received more than $200,000…

4 minutes ago

Cyberpunk TCG’s Kickstarter Campaign Is Officially Now Live, Here’s What’s Included in Every Tier

Following its initial reveal last year right here on IGN, the new entry into the…

33 minutes ago

Get a Brand New Meta Quest 3S VR Headset for Just $193.62 with Free Shipping at AliExpress

There's no better time to dive into the world of immersive VR gaming. AliExpress is…

33 minutes ago

This website uses cookies.