What's Happening?
Motex has released patches for a critical zero-day vulnerability in Lanscope Endpoint Manager, exploited in the wild. The flaw, CVE-2025-61932, allows remote attackers to execute arbitrary code via crafted packets. The vulnerability affects Lanscope versions
9.4.7.1 and earlier, primarily used in Asia. The US cybersecurity agency CISA has added the vulnerability to its Known Exploited Vulnerabilities list, urging federal agencies to patch affected systems.
Why It's Important?
The exploitation of this zero-day vulnerability poses significant risks to organizations using Lanscope Endpoint Manager, particularly in Asia. The vulnerability's high severity underscores the importance of timely patching and cybersecurity measures to protect against potential attacks. CISA's involvement highlights the broader implications for federal agencies and the need for vigilance in addressing security threats.
What's Next?
Organizations using Lanscope Endpoint Manager must prioritize patching to mitigate risks associated with the vulnerability. CISA's directive for federal agencies to patch systems within three weeks emphasizes the urgency of addressing this security threat. Continued monitoring and updates from cybersecurity agencies will be crucial in preventing further exploitation and ensuring system integrity.












