HomeVulnerabilityCrucial Lanscope Endpoint Supervisor Bug Exploited in Ongoing Cyberattacks, CISA Confirms

Crucial Lanscope Endpoint Supervisor Bug Exploited in Ongoing Cyberattacks, CISA Confirms

The U.S. Cybersecurity and Infrastructure Safety Company (CISA) on Wednesday added a essential security flaw impacting Motex Lanscope Endpoint Supervisor to its Identified Exploited Vulnerabilities (KEV) catalog, stating it has been actively exploited within the wild.

The vulnerability, CVE-2025-61932 (CVSS v4 rating: 9.3), impacts on-premises variations of Lanscope Endpoint Supervisor, particularly Consumer program and Detection Agent, and will enable attackers to execute arbitrary code on inclined programs.

“Motex LANSCOPE Endpoint Supervisor comprises an improper verification of supply of a communication channel vulnerability, permitting an attacker to execute arbitrary code by sending specifically crafted packets,” CISA mentioned.

CIS Build Kits

The flaw impacts variations 9.4.7.1 and earlier. It has been addressed within the variations beneath –

  • 9.3.2.7
  • 9.3.3.9
  • 9.4.0.5
  • 9.4.1.5
  • 9.4.2.6
  • 9.4.3.8
  • 9.4.4.6
  • 9.4.5.4
  • 9.4.6.3, and
  • 9.4.7.3

It is presently not identified how the vulnerability is being exploited in real-world assaults, who’s behind them, or the size of such efforts. Nevertheless, an alert issued by the Japan Vulnerability Notes (JVN) portal earlier this week famous that Motex has confirmed an unnamed buyer “acquired a malicious packet suspected to focus on this vulnerability.”

See also  Understanding APIs and the way attackers abuse them to steal knowledge

In mild of lively exploitation efforts, Federal Civilian Govt Department (FCEB) companies are really useful to remediate CVE-2025-61932 by November 12, 2025, to safeguard their networks.

- Advertisment -spot_img
RELATED ARTICLES

LEAVE A REPLY

Please enter your comment!
Please enter your name here

- Advertisment -

Most Popular