Skip to content
  • Home
  • Cyber Map
  • About Us – Contact
  • Disclaimer
  • Terms and Rules
  • Privacy Policy
Cyber Web Spider Blog – News

Cyber Web Spider Blog – News

Globe Threat Map provides a real-time, interactive 3D visualization of global cyber threats. Monitor DDoS attacks, malware, and hacking attempts with geo-located arcs on a rotating globe. Stay informed with live logs and archive stats.

  • Home
  • Cyber Map
  • Cyber Security News
  • Security Week News
  • The Hacker News
  • How To?
  • Toggle search form
Lanscope Endpoint Manager Zero-Day Exploited in the Wild

Lanscope Endpoint Manager Zero-Day Exploited in the Wild

Posted on October 23, 2025October 23, 2025 By CWS

Kyocera Communications subsidiary Motex this week launched pressing patches for a critical-severity vulnerability in Lanscope Endpoint Supervisor that has been exploited within the wild as a zero-day.

Tracked as CVE-2025-61932 (CVSS rating of 9.8), the bug is described as “an improper verification of supply of a communication channel” challenge, which permits distant attackers to ship crafted packets and obtain arbitrary code execution.

In its advisory, Japan-based Motex warned that, in a buyer atmosphere, “unauthorized packets have been obtained from exterior”, hinting at an exploitation try.

There doesn’t look like any public data on the assaults exploiting CVE-2025-61932, however Japan’s JPCERT/CC mentioned it’s conscious of attainable assaults in opposition to home organizations. This isn’t stunning contemplating that the Lanscope endpoint administration product is primarily utilized in Asia, notably in Japan.

The flaw impacts on-premises Lanscope Endpoint Supervisor variations 9.4.7.1 and earlier, and was resolved with the discharge of variations 9.3.2.7, 9.3.3.9, 9.4.0.5, 9.4.1.5, 9.4.2.6, 9.4.3.8, 9.4.4.6, 9.4.5.4, 9.4.6.3, and 9.4.7.3​.

All shopper methods needs to be up to date to a patch model, however the supervisor’s model improve shouldn’t be crucial, Motex mentioned.

On Wednesday, the US cybersecurity company CISA added CVE-2025-61932 to its Identified Exploited Vulnerabilities (KEV) listing, warning of its in-the-wild abuse.

As mandated by the Binding Operational Directive (BOD) 22-01, federal businesses ought to establish susceptible Lanscope Endpoint Supervisor deployments of their environments and patch them inside three weeks (by November 12).Commercial. Scroll to proceed studying.

“The sort of vulnerability is a frequent assault vector for malicious cyber actors and poses vital dangers to the federal enterprise,” CISA warned.

BOD 22-01 solely applies to federal businesses, however all organizations are suggested to evaluate CISA’s KEV listing and apply patches and mitigations for the vulnerabilities it describes.

Associated: CISA Warns of Exploited Apple, Kentico, Microsoft Vulnerabilities

Associated: CISA Confirms Exploitation of Newest Oracle EBS Vulnerability

Associated: Organizations Warned of Exploited Adobe AEM Types Vulnerability

Associated: Microsoft Patches 173 Vulnerabilities, Together with Exploited Home windows Flaws

Security Week News Tags:Endpoint, Exploited, LANSCOPE, Manager, Wild, ZeroDay

Post navigation

Previous Post: Mobile Security: Verizon Says Attacks Soar, AI-Powered Threats Raise Alarm
Next Post: BIND Updates Address High-Severity Cache Poisoning Flaws

Related Posts

Escape Secures  Million to Enhance Automated Pentesting Escape Secures $18 Million to Enhance Automated Pentesting Security Week News
Recently Disrupted DanaBot Leaked Valuable Data for 3 Years Recently Disrupted DanaBot Leaked Valuable Data for 3 Years Security Week News
Proofpoint Completes .8 Billion Acquisition of Hornetsecurity  Proofpoint Completes $1.8 Billion Acquisition of Hornetsecurity  Security Week News
CISA’s Ransomware Alerts in KEV: A Silent Update Challenge CISA’s Ransomware Alerts in KEV: A Silent Update Challenge Security Week News
Critical Docker AI Flaw Enables RCE and Data Breaches Critical Docker AI Flaw Enables RCE and Data Breaches Security Week News
Cisco ISE, CitrixBleed 2 Vulnerabilities Exploited as Zero-Days: Amazon Cisco ISE, CitrixBleed 2 Vulnerabilities Exploited as Zero-Days: Amazon Security Week News

Categories

  • Cyber Security News
  • How To?
  • Security Week News
  • The Hacker News

Recent Posts

  • Critical F5 BIG-IP Vulnerability Now Actively Exploited
  • China-Linked Cyber Threats Target Southeast Asian Government
  • AI-Powered VoidLink Malware Framework Poses New Cyber Threat
  • Top Log Monitoring Tools to Watch in 2026
  • Top Spam Filter Tools for 2026: A Comprehensive Guide

Pages

  • About Us – Contact
  • Disclaimer
  • Privacy Policy
  • Terms and Rules

Archives

  • March 2026
  • February 2026
  • January 2026
  • December 2025
  • November 2025
  • October 2025
  • September 2025
  • August 2025
  • July 2025
  • June 2025
  • May 2025

Recent Posts

  • Critical F5 BIG-IP Vulnerability Now Actively Exploited
  • China-Linked Cyber Threats Target Southeast Asian Government
  • AI-Powered VoidLink Malware Framework Poses New Cyber Threat
  • Top Log Monitoring Tools to Watch in 2026
  • Top Spam Filter Tools for 2026: A Comprehensive Guide

Pages

  • About Us – Contact
  • Disclaimer
  • Privacy Policy
  • Terms and Rules

Categories

  • Cyber Security News
  • How To?
  • Security Week News
  • The Hacker News

Copyright © 2026 Cyber Web Spider Blog – News.

Powered by PressBook Masonry Dark