Description

The U.S. Cybersecurity and Infrastructure Security Agency warned about a critical vulnerability in Motex Lanscope Endpoint Manager that is currently being exploited in active attacks. CVE-2025-61932 has been rated 9.3 and affects the Client Program and Detection Agent in on-premises versions of the software. This vulnerability allows attackers to execute arbitrary code by sending specially crafted network packets. CISA added the issue to its KEV catalog, confirming malicious actors are taking advantage of it. All builds up to 9.4.7.1 are affected, though Motex has released patched versions to address the issue. The vulnerability is caused by inadequate verification of the communication source, which means the software fails to properly verify the authenticity of data it receives. This vulnerability allows an attacker to remotely inject and execute malicious code. According to reports from the Japan Vulnerability Notes (JVN), at least one of the Motex customers has already been sent suspicious packets against this vulnerability. Details regarding the attackers and the extent of the exploitation are not clear, but again, this breach was enabled by an improper security design and validation mechanism. In light of the active exploitation, organizations utilizing Lanscope Endpoint Manager should update immediately to the latest patched versions, as listed by Motex, to avoid unauthorized access. FCEB agencies have been encouraged to complete remediation no later than November 12, 2025. Beyond patching, administrators should enhance network monitoring, block communications that are not necessary, and apply strict validation rules for external data sources. Ongoing security audits, accompanied by prompt application of vendor updates, are very necessary to protect these systems against such zero-day attacks in the future.