Skip to content
  • Home
  • Cyber Map
  • About Us – Contact
  • Disclaimer
  • Terms and Rules
  • Privacy Policy
Cyber Web Spider Blog – News

Cyber Web Spider Blog – News

Globe Threat Map provides a real-time, interactive 3D visualization of global cyber threats. Monitor DDoS attacks, malware, and hacking attempts with geo-located arcs on a rotating globe. Stay informed with live logs and archive stats.

  • Home
  • Cyber Map
  • Cyber Security News
  • Security Week News
  • The Hacker News
  • How To?
  • Toggle search form
LANSCOPE Endpoint Manager Vulnerability Let Attackers Execute Remote Code

LANSCOPE Endpoint Manager Vulnerability Let Attackers Execute Remote Code

Posted on October 21, 2025October 21, 2025 By CWS

Motex has disclosed a extreme distant code execution vulnerability in its LANSCOPE Endpoint Supervisor On-Premise Version. Assigned CVE-2025-61932, the flaw carries a CVSS 3.0 rating of 9.8, classifying it as an emergency-level menace.

This vulnerability might enable attackers to execute arbitrary code on affected programs, doubtlessly resulting in full compromise of endpoint gadgets.

The problem resides within the product’s Shopper Program (MR) and Detection Agent (DA), parts chargeable for managing and monitoring endpoint safety.

In keeping with Motex’s announcement, variations as much as 9.4.7.1 are susceptible. Importantly, the cloud-based version stays unaffected, sparing customers of the SaaS model from speedy threat.

Nevertheless, the on-premise deployment, well-liked amongst organizations looking for larger management over their IT environments, now faces pressing scrutiny.

LANSCOPE Endpoint Supervisor Vulnerability

What elevates the alarm is proof of energetic exploitation. Motex studies confirmed situations the place prospects’ environments obtained malicious packets from exterior sources.

Attackers seem to focus on the client-side packages remotely, exploiting weaknesses that bypass typical community defenses.

Safety researchers speculate that this might stem from improper enter validation within the detection and administration protocols, although full technical particulars await impartial evaluation.

This vulnerability underscores broader dangers in endpoint administration instruments, which frequently run with elevated privileges. As soon as exploited, adversaries might deploy malware, steal delicate knowledge, or pivot deeper into company networks.

Given the excessive CVSS rating pushed by its community accessibility, low complexity, and lack of privileges or consumer interplay required organizations utilizing affected variations ought to prioritize remediation.

Motex has promptly launched a repair, accessible through their buyer assist portal, LANSCOPE PORTAL. The replace targets consumer PCs solely; the central supervisor doesn’t require upgrading.

Deployment follows customary procedures, making it simple for IT groups to roll out throughout endpoints. As of August 2025, when the advisory was issued, no widespread breaches have been publicly linked to this CVE, however the confirmed malicious exercise alerts potential for fast escalation.

Cybersecurity consultants urge speedy patching to mitigate dangers, particularly in hybrid work setups the place endpoints join remotely.

Observe us on Google Information, LinkedIn, and X for every day cybersecurity updates. Contact us to characteristic your tales.

Cyber Security News Tags:Attackers, Code, Endpoint, Execute, LANSCOPE, Manager, Remote, Vulnerability

Post navigation

Previous Post: 131 Malicious Extensions Targeting WhatsApp Used Found in Chrome Web Store
Next Post: Dataminr to Acquire ThreatConnect for $290 Million

Related Posts

Threat Actors Using Typosquatted PyPI Packages to Steal Cryptocurrency from Bittensor Wallets Threat Actors Using Typosquatted PyPI Packages to Steal Cryptocurrency from Bittensor Wallets Cyber Security News
New One-Click Microsoft Copilot Vulnerability Grants Attackers Undetected Access to Sensitive Data New One-Click Microsoft Copilot Vulnerability Grants Attackers Undetected Access to Sensitive Data Cyber Security News
Stealthy WordPress Malware Deliver Windows Trojan via PHP Backdoor Stealthy WordPress Malware Deliver Windows Trojan via PHP Backdoor Cyber Security News
ExpressVPN Windows Client Vulnerability Exposes Users Real IP Addresses With RDP Connection ExpressVPN Windows Client Vulnerability Exposes Users Real IP Addresses With RDP Connection Cyber Security News
Mozilla Wants All New Firefox Extensions to Disclose Data Collection Policies Mozilla Wants All New Firefox Extensions to Disclose Data Collection Policies Cyber Security News
Critical Windows Notepad Flaw Enables Remote Code Execution Critical Windows Notepad Flaw Enables Remote Code Execution Cyber Security News

Categories

  • Cyber Security News
  • How To?
  • Security Week News
  • The Hacker News

Recent Posts

  • Muddled Libra Exploits VMware vSphere in Cyber Attack
  • Feiniu NAS Devices Targeted in Major Botnet Attack
  • Rapid SSH Worm Exploits Linux Systems with Credential Stuffing
  • Odido Telecom Hacked: 6.2 Million Accounts Compromised
  • Lazarus Group Targets npm and PyPI with Malicious Packages

Pages

  • About Us – Contact
  • Disclaimer
  • Privacy Policy
  • Terms and Rules

Archives

  • February 2026
  • January 2026
  • December 2025
  • November 2025
  • October 2025
  • September 2025
  • August 2025
  • July 2025
  • June 2025
  • May 2025

Recent Posts

  • Muddled Libra Exploits VMware vSphere in Cyber Attack
  • Feiniu NAS Devices Targeted in Major Botnet Attack
  • Rapid SSH Worm Exploits Linux Systems with Credential Stuffing
  • Odido Telecom Hacked: 6.2 Million Accounts Compromised
  • Lazarus Group Targets npm and PyPI with Malicious Packages

Pages

  • About Us – Contact
  • Disclaimer
  • Privacy Policy
  • Terms and Rules

Categories

  • Cyber Security News
  • How To?
  • Security Week News
  • The Hacker News