Skip to content
  • Blog Home
  • Cyber Map
  • About Us – Contact
  • Disclaimer
  • Terms and Rules
  • Privacy Policy
Cyber Web Spider Blog – News

Cyber Web Spider Blog – News

Globe Threat Map provides a real-time, interactive 3D visualization of global cyber threats. Monitor DDoS attacks, malware, and hacking attempts with geo-located arcs on a rotating globe. Stay informed with live logs and archive stats.

  • Home
  • Cyber Map
  • Cyber Security News
  • Security Week News
  • The Hacker News
  • How To?
  • Toggle search form

LANSCOPE Endpoint Manager Vulnerability Let Attackers Execute Remote Code

Posted on October 21, 2025October 21, 2025 By CWS

Motex has disclosed a extreme distant code execution vulnerability in its LANSCOPE Endpoint Supervisor On-Premise Version. Assigned CVE-2025-61932, the flaw carries a CVSS 3.0 rating of 9.8, classifying it as an emergency-level menace.

This vulnerability might enable attackers to execute arbitrary code on affected programs, doubtlessly resulting in full compromise of endpoint gadgets.

The problem resides within the product’s Shopper Program (MR) and Detection Agent (DA), parts chargeable for managing and monitoring endpoint safety.

In keeping with Motex’s announcement, variations as much as 9.4.7.1 are susceptible. Importantly, the cloud-based version stays unaffected, sparing customers of the SaaS model from speedy threat.

Nevertheless, the on-premise deployment, well-liked amongst organizations looking for larger management over their IT environments, now faces pressing scrutiny.

LANSCOPE Endpoint Supervisor Vulnerability

What elevates the alarm is proof of energetic exploitation. Motex studies confirmed situations the place prospects’ environments obtained malicious packets from exterior sources.

Attackers seem to focus on the client-side packages remotely, exploiting weaknesses that bypass typical community defenses.

Safety researchers speculate that this might stem from improper enter validation within the detection and administration protocols, although full technical particulars await impartial evaluation.

This vulnerability underscores broader dangers in endpoint administration instruments, which frequently run with elevated privileges. As soon as exploited, adversaries might deploy malware, steal delicate knowledge, or pivot deeper into company networks.

Given the excessive CVSS rating pushed by its community accessibility, low complexity, and lack of privileges or consumer interplay required organizations utilizing affected variations ought to prioritize remediation.

Motex has promptly launched a repair, accessible through their buyer assist portal, LANSCOPE PORTAL. The replace targets consumer PCs solely; the central supervisor doesn’t require upgrading.

Deployment follows customary procedures, making it simple for IT groups to roll out throughout endpoints. As of August 2025, when the advisory was issued, no widespread breaches have been publicly linked to this CVE, however the confirmed malicious exercise alerts potential for fast escalation.

Cybersecurity consultants urge speedy patching to mitigate dangers, particularly in hybrid work setups the place endpoints join remotely.

Observe us on Google Information, LinkedIn, and X for every day cybersecurity updates. Contact us to characteristic your tales.

Cyber Security News Tags:Attackers, Code, Endpoint, Execute, LANSCOPE, Manager, Remote, Vulnerability

Post navigation

Previous Post: 131 Malicious Extensions Targeting WhatsApp Used Found in Chrome Web Store
Next Post: Dataminr to Acquire ThreatConnect for $290 Million

Related Posts

5 Immediate Steps to be Followed After Clicking on a Malicious Link Cyber Security News
Microsoft Patches Wormable RCE Vulnerability in Windows and Windows Server Cyber Security News
ConnectWise Hacked – Nation State Actors Compromised the Systems to Access Customer Data Cyber Security News
Behavioral Analysis for Detecting APT Intrusions in Real Time Cyber Security News
Chinese State-Sponsored Hackers Attacking Telecommunications Infrastructure to Harvest Sensitive Data Cyber Security News
Critical WordPress Plugin Vulnerability Exposes 70,000+ Sites to RCE Attacks Cyber Security News

Categories

  • Cyber Security News
  • How To?
  • Security Week News
  • The Hacker News

Recent Posts

  • Cavalry Werewolf APT Hackers Attacking Multiple Industries With FoalShell and StallionRAT
  • Threat Actors Leverage npm Ecosystem to Deliver AdaptixC2 Post-Exploitation Framework
  • Pakistani Threat Actors Targeting Indian Govt. With Email Mimic as ‘NIC eEmail Services’
  • How Threat Intelligence Can Save Money and Resources for Businesses
  • Microsoft Confirms Recent Updates Cause Login Issues on Windows 11 24H2, 25H2, and Windows Server 2025

Pages

  • About Us – Contact
  • Disclaimer
  • Privacy Policy
  • Terms and Rules

Archives

  • October 2025
  • September 2025
  • August 2025
  • July 2025
  • June 2025
  • May 2025

Recent Posts

  • Cavalry Werewolf APT Hackers Attacking Multiple Industries With FoalShell and StallionRAT
  • Threat Actors Leverage npm Ecosystem to Deliver AdaptixC2 Post-Exploitation Framework
  • Pakistani Threat Actors Targeting Indian Govt. With Email Mimic as ‘NIC eEmail Services’
  • How Threat Intelligence Can Save Money and Resources for Businesses
  • Microsoft Confirms Recent Updates Cause Login Issues on Windows 11 24H2, 25H2, and Windows Server 2025

Pages

  • About Us – Contact
  • Disclaimer
  • Privacy Policy
  • Terms and Rules

Categories

  • Cyber Security News
  • How To?
  • Security Week News
  • The Hacker News