Connect with us

Hi, what are you looking for?

SecurityWeekSecurityWeek

Vulnerabilities

Lanscope Endpoint Manager Zero-Day Exploited in the Wild

The bug has been exploited in the wild as a zero-day and the US cybersecurity agency CISA has added it to its KEV catalog.

Kyocera Communications subsidiary Motex this week released urgent patches for a critical-severity vulnerability in Lanscope Endpoint Manager that has been exploited in the wild as a zero-day.

Tracked as CVE-2025-61932 (CVSS score of 9.8), the bug is described as “an improper verification of source of a communication channel” issue, which allows remote attackers to send crafted packets and achieve arbitrary code execution.

In its advisory, Japan-based Motex warned that, in a customer environment, “unauthorized packets were received from outside”, hinting at an exploitation attempt.

There does not appear to be any public information on the attacks exploiting CVE-2025-61932, but Japan’s JPCERT/CC said it’s aware of possible attacks against domestic organizations. This is not surprising considering that the Lanscope endpoint management product is primarily used in Asia, particularly in Japan.

The flaw affects on-premises Lanscope Endpoint Manager versions 9.4.7.1 and earlier, and was resolved with the release of versions 9.3.2.7, 9.3.3.9, 9.4.0.5, 9.4.1.5, 9.4.2.6, 9.4.3.8, 9.4.4.6, 9.4.5.4, 9.4.6.3, and 9.4.7.3​.

All client systems should be updated to a patch version, but the manager’s version upgrade is not necessary, Motex said.

Advertisement. Scroll to continue reading.

On Wednesday, the US cybersecurity agency CISA added CVE-2025-61932 to its Known Exploited Vulnerabilities (KEV) list, warning of its in-the-wild abuse.

As mandated by the Binding Operational Directive (BOD) 22-01, federal agencies should identify vulnerable Lanscope Endpoint Manager deployments in their environments and patch them within three weeks (by November 12).

“This type of vulnerability is a frequent attack vector for malicious cyber actors and poses significant risks to the federal enterprise,” CISA warned.

BOD 22-01 only applies to federal agencies, but all organizations are advised to review CISA’s KEV list and apply patches and mitigations for the vulnerabilities it describes.

Related: CISA Warns of Exploited Apple, Kentico, Microsoft Vulnerabilities

Related: CISA Confirms Exploitation of Latest Oracle EBS Vulnerability

Related: Organizations Warned of Exploited Adobe AEM Forms Vulnerability

Related: Microsoft Patches 173 Vulnerabilities, Including Exploited Windows Flaws

Written By

Ionut Arghire is an international correspondent for SecurityWeek.

Trending

Daily Briefing Newsletter

Subscribe to the SecurityWeek Email Briefing to stay informed on the latest threats, trends, and technology, along with insightful columns from industry experts.

With "Shadow AI" usage becoming prevalent in organizations, learn how to balance the need for rapid experimentation with the rigorous controls required for enterprise-grade deployment.

Register

Delve into big-picture strategies to reduce attack surfaces, improve patch management, conduct post-incident forensics, and tools and tricks needed in a modern organization.

Register

People on the Move

Irving Bruckstein has been appointed Chief Executive Officer at Cyber A.I. Group.

Anti-ransomware platform Halcyon has named Kirstjen Nielsen and Chris Inglis as Strategic Advisors.

ThreatModeler has appointed Kevin Gallagher as Chief Executive Officer.

More People On The Move

Expert Insights

Daily Briefing Newsletter

Subscribe to the SecurityWeek Email Briefing to stay informed on the latest cybersecurity news, threats, and expert insights. Unsubscribe at any time.