Skip to content
  • Home
  • Cyber Map
  • About Us – Contact
  • Disclaimer
  • Terms and Rules
  • Privacy Policy
Cyber Web Spider Blog – News

Cyber Web Spider Blog – News

Globe Threat Map provides a real-time, interactive 3D visualization of global cyber threats. Monitor DDoS attacks, malware, and hacking attempts with geo-located arcs on a rotating globe. Stay informed with live logs and archive stats.

  • Home
  • Cyber Map
  • Cyber Security News
  • Security Week News
  • The Hacker News
  • How To?
  • Toggle search form
LANSCOPE Endpoint Manager Vulnerability Let Attackers Execute Remote Code

LANSCOPE Endpoint Manager Vulnerability Let Attackers Execute Remote Code

Posted on October 21, 2025October 21, 2025 By CWS

Motex has disclosed a extreme distant code execution vulnerability in its LANSCOPE Endpoint Supervisor On-Premise Version. Assigned CVE-2025-61932, the flaw carries a CVSS 3.0 rating of 9.8, classifying it as an emergency-level menace.

This vulnerability might enable attackers to execute arbitrary code on affected programs, doubtlessly resulting in full compromise of endpoint gadgets.

The problem resides within the product’s Shopper Program (MR) and Detection Agent (DA), parts chargeable for managing and monitoring endpoint safety.

In keeping with Motex’s announcement, variations as much as 9.4.7.1 are susceptible. Importantly, the cloud-based version stays unaffected, sparing customers of the SaaS model from speedy threat.

Nevertheless, the on-premise deployment, well-liked amongst organizations looking for larger management over their IT environments, now faces pressing scrutiny.

LANSCOPE Endpoint Supervisor Vulnerability

What elevates the alarm is proof of energetic exploitation. Motex studies confirmed situations the place prospects’ environments obtained malicious packets from exterior sources.

Attackers seem to focus on the client-side packages remotely, exploiting weaknesses that bypass typical community defenses.

Safety researchers speculate that this might stem from improper enter validation within the detection and administration protocols, although full technical particulars await impartial evaluation.

This vulnerability underscores broader dangers in endpoint administration instruments, which frequently run with elevated privileges. As soon as exploited, adversaries might deploy malware, steal delicate knowledge, or pivot deeper into company networks.

Given the excessive CVSS rating pushed by its community accessibility, low complexity, and lack of privileges or consumer interplay required organizations utilizing affected variations ought to prioritize remediation.

Motex has promptly launched a repair, accessible through their buyer assist portal, LANSCOPE PORTAL. The replace targets consumer PCs solely; the central supervisor doesn’t require upgrading.

Deployment follows customary procedures, making it simple for IT groups to roll out throughout endpoints. As of August 2025, when the advisory was issued, no widespread breaches have been publicly linked to this CVE, however the confirmed malicious exercise alerts potential for fast escalation.

Cybersecurity consultants urge speedy patching to mitigate dangers, particularly in hybrid work setups the place endpoints join remotely.

Observe us on Google Information, LinkedIn, and X for every day cybersecurity updates. Contact us to characteristic your tales.

Cyber Security News Tags:Attackers, Code, Endpoint, Execute, LANSCOPE, Manager, Remote, Vulnerability

Post navigation

Previous Post: 131 Malicious Extensions Targeting WhatsApp Used Found in Chrome Web Store
Next Post: Dataminr to Acquire ThreatConnect for $290 Million

Related Posts

10 Best Enterprise Remote Access Software 10 Best Enterprise Remote Access Software Cyber Security News
Windows 11 25H2 Update Preview Released, What’s New? Windows 11 25H2 Update Preview Released, What’s New? Cyber Security News
Hackers Target Android Users with Fake App Testing Invites Hackers Target Android Users with Fake App Testing Invites Cyber Security News
AppGuard Critiques AI Defenses & Expands Insider Release AppGuard Critiques AI Defenses & Expands Insider Release Cyber Security News
Hackers Exploit NTLM Authentication Flaws to Target Windows Systems Hackers Exploit NTLM Authentication Flaws to Target Windows Systems Cyber Security News
OpenClaw 2026.2.23 Enhances AI Security and Features OpenClaw 2026.2.23 Enhances AI Security and Features Cyber Security News

Categories

  • Cyber Security News
  • How To?
  • Security Week News
  • The Hacker News

Recent Posts

  • Critical Vulnerability in MongoDB Risks Data Exposure
  • Windows Zero-Day Exploits: YellowKey and GreenPlasma Revealed
  • Fragnesia Linux Kernel Vulnerability Allows Root Access
  • NGINX Vulnerability Allows Remote Code Execution
  • Critical 18-Year NGINX Vulnerability Enables Remote Code Execution

Pages

  • About Us – Contact
  • Disclaimer
  • Privacy Policy
  • Terms and Rules

Archives

  • May 2026
  • April 2026
  • March 2026
  • February 2026
  • January 2026
  • December 2025
  • November 2025
  • October 2025
  • September 2025
  • August 2025
  • July 2025
  • June 2025
  • May 2025

Recent Posts

  • Critical Vulnerability in MongoDB Risks Data Exposure
  • Windows Zero-Day Exploits: YellowKey and GreenPlasma Revealed
  • Fragnesia Linux Kernel Vulnerability Allows Root Access
  • NGINX Vulnerability Allows Remote Code Execution
  • Critical 18-Year NGINX Vulnerability Enables Remote Code Execution

Pages

  • About Us – Contact
  • Disclaimer
  • Privacy Policy
  • Terms and Rules

Categories

  • Cyber Security News
  • How To?
  • Security Week News
  • The Hacker News

Copyright © 2026 Cyber Web Spider Blog – News.

Powered by PressBook Masonry Dark