Critical Remote Code Execution Vulnerability in LANSCOPE Endpoint Manager On-Premises Edition

A critical security vulnerability has been identified in MOTEX Inc.’s LANSCOPE Endpoint Manager On-Premises Edition, designated as CVE-2025-61932. This flaw, carrying a CVSS 3.0 score of 9.8, poses a significant risk to organizations utilizing this endpoint management solution.

Vulnerability Overview

The vulnerability stems from improper verification of the origin of incoming requests within the Client Program (MR) and Detection Agent (DA) components of LANSCOPE Endpoint Manager. This oversight allows unauthenticated attackers to send specially crafted packets, leading to arbitrary code execution on affected systems. Such exploitation can result in full system compromise, enabling attackers to deploy malware, exfiltrate sensitive data, or disrupt operations.

Affected Versions

All versions up to and including 9.4.7.1 of the on-premises edition are susceptible to this vulnerability. Notably, the cloud-based edition remains unaffected, mitigating risk for users of the SaaS version.

Evidence of Active Exploitation

MOTEX Inc. has confirmed instances where customers’ environments received malicious packets targeting this vulnerability. These attacks exploit weaknesses that bypass typical network defenses, underscoring the urgency for immediate remediation.

Technical Details

The vulnerability is characterized by:

– Attack Vector: Network
– Attack Complexity: Low
– Privileges Required: None
– User Interaction: None
– Impact: High on confidentiality, integrity, and availability

This combination makes the vulnerability particularly dangerous, as it can be exploited remotely without user interaction or elevated privileges.

Mitigation Measures

MOTEX Inc. has released a security update to address this issue. The patch is available through the LANSCOPE PORTAL and targets client PCs exclusively; the central manager does not require upgrading. Organizations are strongly advised to apply this update immediately to mitigate potential risks.

Recommendations for Organizations

1. Immediate Patching: Deploy the provided security update across all affected endpoints without delay.
2. Network Monitoring: Implement monitoring for unusual incoming packets targeting the Client Program (MR) and Detection Agent (DA) components.
3. Access Controls: Review and strengthen access controls to limit exposure to potential attacks.
4. Incident Response Preparedness: Ensure that incident response plans are updated and ready to address potential exploitation attempts.

Conclusion

The discovery of CVE-2025-61932 in LANSCOPE Endpoint Manager On-Premises Edition highlights the critical importance of timely vulnerability management. Organizations must act swiftly to apply the necessary patches and implement robust security measures to protect their systems from potential exploitation.