Description

A critical vulnerability has been uncovered in the on-premise version of LANSCOPE Endpoint Manager, posing a serious security risk. Identified as CVE-2025-61932, the flaw exists in two key components the Client Program (MR) and the Detection Agent (DA). The vulnerability enables attackers to execute unauthorized code on affected machines. Notably, there have already been reports of the flaw being exploited in real-world scenarios, which underscores the urgent need for users to apply the available fix. The issue stems from how the software processes network traffic. Security analysts determined that an attacker could send specially crafted packets to systems running vulnerable versions, leading to a critical failure. This allows the attacker to run arbitrary commands with elevated privileges, without requiring any user interaction. The flaw affects version 9.4.7.1 and earlier of the on-premise edition, leaving potentially thousands of systems exposed. Compounding the severity, the attack can occur without any clicks or user engagement, making it especially dangerous in enterprise environments. While organizations using the on-premise edition are directly at risk, those utilizing the cloud-based version remain unaffected. The vulnerability has been assigned a CVSS 3.0 score of 9.8, reflecting both its severity and ease of exploitation. A security patch has been released and is now available through the official LANSCOPE support portal. Because the vulnerability affects the client-side components, it is critical that all endpoint installations of the on-premise software be updated immediately. The patch process follows the standard update method and does not require any changes to the management console. Prompt action is essential to minimize exposure and prevent potential damage.