CVE-2025-61932
Published Oct 20, 2025
Last updated 18 days ago
AI description
CVE-2025-61932 is a vulnerability in Motex's Lanscope Endpoint Manager (On-Premises), specifically affecting the Client program (MR) and Detection Agent (DA). The vulnerability stems from the software's improper verification of the origin of incoming requests. This flaw allows a remote attacker to execute arbitrary code on the system by sending specially crafted packets. It has been confirmed that the vulnerability has been actively exploited in the wild. CISA has added CVE-2025-61932 to its Known Exploited Vulnerabilities (KEV) list.
- Description
- Lanscope Endpoint Manager (On-Premises) (Client program (MR) and Detection agent (DA)) improperly verifies the origin of incoming requests, allowing an attacker to execute arbitrary code by sending specially crafted packets.
- Source
- vultures@jpcert.or.jp
- NVD status
- Analyzed
- Products
- lanscope_endpoint_manager
CVSS 4.0
- Type
- Secondary
- Base score
- 9.3
- Impact score
- -
- Exploitability score
- -
- Vector string
- CVSS:4.0/AV:N/AC:L/AT:N/PR:N/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N/E:X/CR:X/IR:X/AR:X/MAV:X/MAC:X/MAT:X/MPR:X/MUI:X/MVC:X/MVI:X/MVA:X/MSC:X/MSI:X/MSA:X/S:X/AU:X/R:X/V:X/RE:X/U:X
- Severity
- CRITICAL
CVSS 3.0
- Type
- Secondary
- Base score
- 9.8
- Impact score
- 5.9
- Exploitability score
- 3.9
- Vector string
- CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H
- Severity
- CRITICAL
Data from CISA
- Vulnerability name
- Motex LANSCOPE Endpoint Manager Improper Verification of Source of a Communication Channel Vulnerability
- Exploit added on
- Oct 22, 2025
- Exploit action due
- Nov 12, 2025
- Required action
- Apply mitigations per vendor instructions, follow applicable BOD 22-01 guidance for cloud services, or discontinue use of the product if mitigations are unavailable.
- vultures@jpcert.or.jp
- CWE-940
- Hype score
- Not currently trending
Suspected Chinese APT “Tick” exploiting a critical flaw (CVE-2025-61932, CVSS 9.3) in Motex Lanscope Endpoint Manager to deploy a backdoor dubbed Gokcpdoor. 🎯 Targeted sectors align with espionage goals. (via @Sophos) Patch now. #CyberSecurity #APT #Infosec https://t
@archie_sham
10 Nov 2025
4 Impressions
0 Retweets
0 Likes
0 Bookmarks
0 Replies
0 Quotes
[Dark Reading] APT 'Bronze Butler' Exploits Zero-Day to Root Japan Orgs. A critical security issue in a popular endpoint manager (CVE-2025-61932) allowed Chinese state-sponsored attackers to backdoor Japanese businesses. https://t.co/D0gZ5AHpsu
@shah_sheikh
6 Nov 2025
9 Impressions
0 Retweets
0 Likes
0 Bookmarks
0 Replies
0 Quotes
🚩 Critical Lanscope Endpoint Manager Bug (CVE-2025-61932) Being Actively Exploited https://t.co/cViXPHUS3m CISA has added this vulnerability to its Known Exploited Vulnerabilities catalog after confirming attackers are sending crafted packets that allow unauthenticated remot
@Huntio
4 Nov 2025
797 Impressions
5 Retweets
4 Likes
1 Bookmark
0 Replies
0 Quotes
🚨 Motex LANSCOPE Endpoint Manager [—] Nov 03, 2025 Product Security Advisory Report on CVE-2025-61932 Checkout our Threat Intelligence Platform: https://t.co/QuwNtEgYh1 https://t.co/QuwNtEgYh1 #ThreatIntelligence #CyberSecurity #Innovation #LLM https://t.co/IAu045dqiy
@transilienceai
3 Nov 2025
6 Impressions
0 Retweets
0 Likes
0 Bookmarks
0 Replies
0 Quotes
🚨 CHINA TICK GROUP ZERO-DAY RCE CVE-2025-61932: Hijacks Lanscope Endpoint Mgr w/ SYSTEM privs! Backdoors deployed. ⚠️ Details: https://t.co/LlW0U9vOlm 🔗 Sophos: https://t.co/jTIXguQPC1 @TheHackersNews @Sophos @JPCERT_EN #ZeroDay #RCE #cybersecuritystartupprogram
@The_SatyaDVV
2 Nov 2025
90 Impressions
0 Retweets
0 Likes
0 Bookmarks
0 Replies
0 Quotes
Bronze Butler, a China-linked cyber-espionage group, exploited a zero-day vulnerability (vulnerability (CVE-2025-61932)) in Motex Lanscope Endpoint Manager to deploy the Gokcpdoor malware, exposing organizations to data theft and persistent backdoor access. This enables attackers
@cybernewslive
1 Nov 2025
82 Impressions
0 Retweets
0 Likes
0 Bookmarks
0 Replies
0 Quotes
JPCERT-CC reported on CVE-2025-61932 (CVSS 9.8) last week, saying it was being actively exploited. New report says PRC-linked group BRONZE BUTLER has been actively exploiting this CVE, activity leverages an updated version of their Gokcpdoor backdoor https://t.co/lyTQ25ZZMB
@cyber_megan
1 Nov 2025
264 Impressions
0 Retweets
1 Like
0 Bookmarks
1 Reply
0 Quotes
China-linked group Bronze Butler exploited a zero-day in Motex Lanscope Endpoint Manager (CVE-2025-61932) to deploy Gokcpdoor malware, enabling SYSTEM-level code execution and advanced C2 communication. #BronzeButler #China #ZeroDayExploit https://t.co/HaTdxdKSSq
@TweetThreatNews
1 Nov 2025
110 Impressions
0 Retweets
0 Likes
0 Bookmarks
0 Replies
0 Quotes
📝 𝐂𝐡𝐢𝐧𝐚-𝐥𝐢𝐧𝐤𝐞𝐝 𝐡𝐚𝐜𝐤𝐞𝐫𝐬 𝐞𝐱𝐩𝐥𝐨𝐢𝐭𝐞𝐝 𝐋𝐚𝐧𝐬𝐜𝐨𝐩𝐞 𝐟𝐥𝐚𝐰 𝐚𝐬 𝐚 𝐳𝐞𝐫𝐨-𝐝𝐚𝐲 𝐢𝐧 𝐚𝐭𝐭𝐚𝐜𝐤𝐬 • Bronze Butler exploited a
@PurpleOps_io
1 Nov 2025
29 Impressions
0 Retweets
0 Likes
0 Bookmarks
0 Replies
0 Quotes
Critical Windows RCE Flaw (CVE-2025-61932) Allows SYSTEM Control and Ransomware Deployment. Read the full report on - https://t.co/ARLUjKNxxt https://t.co/tcy8d2cqBH
@Iambivash007
1 Nov 2025
2 Impressions
0 Retweets
0 Likes
0 Bookmarks
0 Replies
0 Quotes
🚨 Critical Lanscope vuln (CVE-2025-61932) lets attackers get SYSTEM access & hijack corporate hosts! Exploited by China-linked APT Tick — CVSS 9.3, JPCERT/CC alert. Patch ASAP! More: https://t.co/YQnpr5AvEK Follow us to support: @kernel_panic69
@kernelpanicsec
1 Nov 2025
0 Impressions
0 Retweets
0 Likes
0 Bookmarks
0 Replies
0 Quotes
🚨 LanScope Endpoint Manager Product Security Advisory [—] Nov 01, 2025 Comprehensive security advisory for LanScope Endpoint Manager, addressing CVE-2025-61932 and associated risks. Checkout our Threat Intelligence Platform: https://t.co/QuwNtEgYh1... https://t.co/gtHkRsgF9O
@transilienceai
1 Nov 2025
46 Impressions
0 Retweets
0 Likes
0 Bookmarks
0 Replies
0 Quotes
🚨 BRONZE BUTLER Threat Analysis [High] Nov 01, 2025 This report details the activities of the Chinese state-sponsored threat group BRONZE BUTLER, focusing on their exploitation of a zero-day vulnerability (CVE-2025-61932) in the Japanese-developed Motex LANSCOPE Endpoint... ht
@transilienceai
1 Nov 2025
44 Impressions
0 Retweets
0 Likes
0 Bookmarks
0 Replies
0 Quotes
China’s BRONZE BUTLER group exploits zero-day flaws like CVE-2025-61932 to conduct stealthy #cyber espionage against #Japan , threatening regional #CyberSecurity & sovereignty. #GodMorningSaturday @CyberpunkGame @cybertruck https://t.co/ShAxvGWt9L
@meng_yao1
1 Nov 2025
52 Impressions
0 Retweets
1 Like
0 Bookmarks
0 Replies
0 Quotes
🚨 China-Linked Tick Group exploits Lanscope Zero-Day (CVE-2025-61932) to compromise corporate systems, posing a severe threat. https://t.co/AQlfWjhs5E
@not2cleverdotme
1 Nov 2025
31 Impressions
0 Retweets
0 Likes
0 Bookmarks
0 Replies
0 Quotes
Falha crítica no Motex Lanscope exposta por grupo chinês: Vulnerabilidade CVE-2025-61932 permite execução remota com privilégios SYSTEM e tem sido explorada para instalar backdoor Gokcpdoor, facilitando espionagem e exfiltração de dados na Ásia. https://t.co/yl1WLJgFsl
@caveiratech
31 Oct 2025
17 Impressions
0 Retweets
1 Like
0 Bookmarks
0 Replies
0 Quotes
China-Linked Group Exploits Lanscope Zero-Day to Hijack Systems A cyber espionage group called Tick exploited CVE-2025-61932, a critical flaw in Motex Lanscope Endpoint Manager, enabling remote attackers to execute SYSTEM-level commands on on-premise versions. JPCERT/CC issued h
@Secwiserapp
31 Oct 2025
49 Impressions
0 Retweets
0 Likes
0 Bookmarks
0 Replies
0 Quotes
⚠️ Des hackers chinois exploitent une faille critique (CVE-2025-61932, score 9.3) dans Motex Lanscope Endpoint Manager. Elle permet l’exécution de commandes SYSTEM et l’implantation du backdoor Gokcpdoor avec nouveaux canaux C2 multiplexés. 🚨 Attaques actives confirm
@CyberHebdo
31 Oct 2025
3 Impressions
0 Retweets
0 Likes
0 Bookmarks
1 Reply
0 Quotes
🇯🇵 🚨 BREAKING: China-linked Tick group exploiting critical Motex Lanscope Endpoint Manager flaw (CVE-2025-61932, CVSS 9.3) enabling remote SYSTEM execution on on-premise instances — JPCERT/CC alert. https://t.co/kYxTjpag9F #cyber #OSINT #Japan
@STRATINT_AI
31 Oct 2025
73 Impressions
0 Retweets
1 Like
0 Bookmarks
0 Replies
0 Quotes
📌 مجموعة التجسس السيبراني "تيك" مرتبطة بالصين استغلت ثغرة أمان حرجة في برنامج "موTex Lanscope" لإختراق الأنظمة المؤسساتية. الثغرة، المسجلة برقم CVE-2025-61932، تتيح
@Cybercachear
31 Oct 2025
53 Impressions
0 Retweets
0 Likes
0 Bookmarks
0 Replies
0 Quotes
⚠️ Chinese hackers are exploiting a critical 9.3 CVE (CVE-2025-61932) in Motex Lanscope Endpoint Manager. It lets them run SYSTEM-level commands and plant a Gokcpdoor backdoor with new multiplexed C2 channels. Active attacks confirmed ↓ https://t.co/HTJHzYQS4x
@TheHackersNews
31 Oct 2025
9883 Impressions
30 Retweets
72 Likes
12 Bookmarks
0 Replies
0 Quotes
⚠️ Chinese hackers are exploiting a critical 9.3 CVE (CVE-2025-61932) in Motex Lanscope Endpoint Manager. It lets them run SYSTEM-level commands and plant a Gokcpdoor backdoor with new multiplexed C2 channels. Active attacks confirmed ↓ https://the... https://t.co/JXaeaEY
@IT_news_for_all
31 Oct 2025
10 Impressions
0 Retweets
0 Likes
0 Bookmarks
0 Replies
0 Quotes
In mid-2025 Sophos CTU researchers observed a campaign from the BRONZE BUTLER (also known as Tick) theat actor that exploited a zero-day vulnerability (CVE-2025-61932) in Motex LANSCOPE Endpoint Manager to steal confidential information. https://t.co/rzLSy3gZ5u https://t.co/7SxOg
@virusbtn
31 Oct 2025
3608 Impressions
11 Retweets
38 Likes
9 Bookmarks
0 Replies
1 Quote
BRONZE BUTLER exploited zero-day CVE-2025-61932 in Motex LANSCOPE Endpoint Manager to execute SYSTEM-level commands, deploy Gokcpdoor and Havoc backdoors, and exfiltrate data via cloud storage and remote tunnels. #Japan #ZeroDay #Backdoor https://t.co/IyRPvTM9xY
@TweetThreatNews
31 Oct 2025
20 Impressions
0 Retweets
0 Likes
0 Bookmarks
0 Replies
0 Quotes
統合版 JPCERT/CC | Weekly Report: LANSCOPE エンドポイントマネージャー オンプレミス版における通信チャネルの送信元検証不備の脆弱性(CVE-2025-61932)について https://t.co/izDRQ1dDm6 #itsec_jp
@itsec_jp
31 Oct 2025
2 Impressions
0 Retweets
0 Likes
0 Bookmarks
0 Replies
0 Quotes
A threat group known as BRONZE BUTLER has exploited a LANSCOPE zero-day vulnerability (CVE-2025-61932) in Japanese asset management software, raising concerns over cybersecurity in the industry. #CyberSecurity #Vulnerability https://t.co/o6vDZN8Ayk
@Cyber_O51NT
31 Oct 2025
613 Impressions
3 Retweets
5 Likes
0 Bookmarks
0 Replies
0 Quotes
My latest blog post about a campaign exploiting the LANSCOPE vulnerability (CVE-2025-61932) has been published. / BRONZE BUTLER exploits Japanese asset management software vulnerability – Sophos News https://t.co/5MRWjeEy3r
@you0708
30 Oct 2025
2974 Impressions
9 Retweets
20 Likes
4 Bookmarks
0 Replies
2 Quotes
BRONZE BUTLER Exploits Japanese Asset Management Software Vulnerability In 2025, CTU researchers identified a sophisticated BRONZE BUTLER campaign exploiting CVE-2025-61932 in Motex LANSCOPE to steal data. The Chinese state-sponsored group, active since 2010, used this zero-day
@Secwiserapp
30 Oct 2025
124 Impressions
1 Retweet
2 Likes
0 Bookmarks
0 Replies
0 Quotes
🔴 Critical LANSCOPE Endpoint Manager Flaw Exploited—CISA Confirms Active Attacks CVE-2025-61932 (CVSS 9.3) hit CISA's Known Exploited Vulnerabilities catalog after confirmed exploitation in Japan. The flaw affects Motex LANSCOPE Endpoint Manager—enterprise client managem
@the_c_protocol
28 Oct 2025
0 Impressions
0 Retweets
0 Likes
0 Bookmarks
0 Replies
0 Quotes
🚨 Lanscope Endpoint Manager [—] Oct 28, 2025 Critical security advisory for Lanscope Endpoint Manager, addressing remote code execution vulnerability CVE-2025-61932. Checkout our Threat Intelligence Platform: https://t.co/QuwNtEgYh1... https://t.co/lBeHGFMYx7
@transilienceai
28 Oct 2025
8 Impressions
0 Retweets
0 Likes
0 Bookmarks
0 Replies
0 Quotes
🚨 CVE-2025-61932 has been flagged as a critical RCE vulnerability targeting the on-prem Motex LANSCOPE Endpoint Manager. It’s actively being exploited in the wild, prompting CISA to add it to the Known Exploited Vulnerabilities catalog. Patch fast-this one’s not theoretica
@AadilAmin05
28 Oct 2025
100 Impressions
0 Retweets
0 Likes
0 Bookmarks
0 Replies
0 Quotes
⚠️ Critical CVEs Under Active Exploitation: Adobe Commerce, Lanscope, WSUS RCE Three critical vulnerabilities are actively exploited right now. CVE-2025-54236 (Adobe Commerce/Magento RCE)—attackers actively exploiting storefronts. CVE-2025-61932 (Lanscope Endpoint
@the_c_protocol
27 Oct 2025
5 Impressions
0 Retweets
0 Likes
0 Bookmarks
0 Replies
0 Quotes
🚨 LANSCOPE Endpoint Manager [—] Oct 27, 2025 Product Security Advisory Report on CVE-2025-61932 Checkout our Threat Intelligence Platform: https://t.co/QuwNtEgYh1 https://t.co/QuwNtEgYh1 #ThreatIntelligence #CyberSecurity #Innovation #LLM https://t.co/vouKWFTrkf
@transilienceai
27 Oct 2025
13 Impressions
0 Retweets
0 Likes
0 Bookmarks
0 Replies
0 Quotes
Lanscope Endpoint Manager vulnerability exploited in zero-day attacks (CVE-2025-61932) - Help Net Security https://t.co/Pp7i3G9vIE
@PVynckier
26 Oct 2025
81 Impressions
0 Retweets
3 Likes
0 Bookmarks
0 Replies
0 Quotes
⚠️ Lanscope (Motex) critical RCE CVE-2025-61932 is being exploited in the wild. If you run Lanscope Endpoint Manager: patch or isolate the console, audit remote-command logs, and block access to management ports NOW. #Lanscope #CVE2025 #InfoSec
@Wh1teCoon
26 Oct 2025
319 Impressions
0 Retweets
1 Like
1 Bookmark
0 Replies
0 Quotes
CISA has confirmed that a critical vulnerability (CVE-2025-61932) in Motex Lanscope Endpoint Manager is being actively exploited. The flaw, which has a CVSS score of 9.8, allows attackers to execute arbitrary code remotely on affected on-premises versions.
@therealbelano
25 Oct 2025
577 Impressions
5 Retweets
10 Likes
0 Bookmarks
2 Replies
0 Quotes
3/5: "CyberShield Hub's RCE radar: RedScan's AI sentinel flags packet anomalies & endpoint exploits—like CVE-2025-61932 chains—in real-time. Lightweight, local-first, no bloat. Windows solid, Linux/macOS inbound. Ever nuked a zero-day mid-manager?"
@y_cybersecurity
25 Oct 2025
69 Impressions
0 Retweets
0 Likes
0 Bookmarks
0 Replies
0 Quotes
Thread: "Motex LANSCOPE RCE (CVE-2025-61932) Goes Wild: Unauth Code Exec on Endpoint Managers—Patch or Perish!" 🚨🔒 1/5: "🚨 ENDPOINT APOCALYPSE: CISA's KEV catalog just added CVE-2025-61932—a CVSS 9.8 RCE in Motex LANSCOPE Endpoint Manager (v9.4.7.2 & earlier).
@y_cybersecurity
25 Oct 2025
56 Impressions
0 Retweets
0 Likes
0 Bookmarks
0 Replies
0 Quotes
RedScan v0.6 Unleashed: AI Defense + Ethical Hacking Bootcamp! 🚀🛡️ Oct 25, 2025, 02:58 PM WAT Cyber fam, RedScan v0.6 is live—slamming WSUS RCE (CVE-2025-59287) and LANSCOPE exploits (CVE-2025-61932) with AI, a SQLite DB, and VirusTotal ThreatFeed (500 free lookups/day)
@CybershieldHub
25 Oct 2025
80 Impressions
0 Retweets
0 Likes
1 Bookmark
0 Replies
0 Quotes
RedScan v0.6 Unleashed: AI Defense + Ethical Hacking Bootcamp! 🚀🛡️ Oct 25, 2025, 02:58 PM WAT Cyber fam, RedScan v0.6 is live—slamming WSUS RCE (CVE-2025-59287) and LANSCOPE exploits (CVE-2025-61932) with AI, a SQLite DB, and VirusTotal ThreatFeed (500 free lookups/day)
@CybershieldHub
25 Oct 2025
1 Impression
0 Retweets
0 Likes
0 Bookmarks
0 Replies
0 Quotes
Thread: "Motex LANSCOPE RCE (CVE-2025-61932) Goes Wild: Unauth Code Exec on Endpoint Managers—Patch or Perish!" 🚨🔒 1/5: "🚨 ENDPOINT APOCALYPSE: CISA's KEV catalog just added CVE-2025-61932—a CVSS 9.8 RCE in Motex LANSCOPE Endpoint Manager (v9.4.7.2 & earlier). Un
@CybershieldHub
25 Oct 2025
47 Impressions
0 Retweets
0 Likes
1 Bookmark
1 Reply
0 Quotes
🚨 Heads up, cybersecurity enthusiasts! A critical #zero-day vulnerability, CVE-2025-61932, in Lanscope Endpoint Manager, is being actively exploited in real-time attacks. Are your systems secured? 🛡️ Now's the time to double-check your defenses and patch up!
@WideWatchers
24 Oct 2025
37 Impressions
0 Retweets
0 Likes
0 Bookmarks
0 Replies
0 Quotes
CISA has added a critical vulnerability, CVE-2025-61932 (CVSS v4 score: 9.3), affecting Motex Lanscope Endpoint Manager to its KEV catalog, confirming active exploitation. https://t.co/ZcQagg7Q60
@securityRSS
24 Oct 2025
17 Impressions
0 Retweets
0 Likes
0 Bookmarks
0 Replies
0 Quotes
🛡️ Cyber Threat Digest – 2025-10-24 KEV: CVE-2025-61932 — Motex LANSCOPE Endpoint Manager NVD: CVE-2025-11429 — flaw was found in News: Mozilla: New Firefox extensions must disclose… #cybersecurity #infosec #CVE More: https://t.co/J1fpKfnDnv
@dpharristech
24 Oct 2025
0 Impressions
0 Retweets
0 Likes
0 Bookmarks
0 Replies
0 Quotes
Critical Lanscope Endpoint Manager Bug Exploited in Ongoing Cyberattacks. The vulnerability, CVE-2025-61932 (CVSS v4 score: 9.3), impacts on-premises versions of Lanscope Endpoint Manager, specifically Client program and Detection Agent. https://t.co/3SQtRszV7M https://t.co/IrZGT
@riskigy
24 Oct 2025
46 Impressions
0 Retweets
0 Likes
0 Bookmarks
0 Replies
0 Quotes
csirt_it: ‼ #Exploited #Motex: rilevato sfruttamento in rete della CVE-2025-61932 relativa al prodotto #LanscopeEndpointManager Rischio:🟠 Tipologia: 🔸 Remote Code Execution 🔗 https://t.co/q0blcfUqn4 🔄 Aggiornamenti disponibili 🔄 https://t.co/HoSCx6RJpa
@Vulcanux_
24 Oct 2025
29 Impressions
0 Retweets
0 Likes
0 Bookmarks
0 Replies
0 Quotes
🚨 CRITICAL Lanscope Endpoint Manager flaw (CVE-2025-61932) is under active attack! Remote code execution possible—patch to 9.4.7.3+ ASAP to block backdoors. CISA sets 12 Nov 2025 remediation deadline. Details: https://t.co/J3mB5STFff... https://t.co/yU9Yb9B2tO
@offseq
24 Oct 2025
99 Impressions
0 Retweets
0 Likes
0 Bookmarks
0 Replies
0 Quotes
Lanscope Endpoint Manager の脆弱性がゼロデイ攻撃で悪用される (CVE-2025-61932) Lanscope Endpoint Manager vulnerability exploited in zero-day attacks (CVE-2025-61932) #HelpNetSecurity (Oct 23) https://t.co/SQLJ3SWBeN
@foxbook
24 Oct 2025
350 Impressions
0 Retweets
3 Likes
1 Bookmark
0 Replies
0 Quotes
CVE-2025-61932 Lanscope Endpoint Managerの脆弱性と影響 https://t.co/lnktun9nqp #Security #セキュリティー #ニュース
@SecureShield_
23 Oct 2025
89 Impressions
0 Retweets
0 Likes
0 Bookmarks
0 Replies
0 Quotes
【緊急脆弱性】米国サイバーセキュリティ・インフラストラクチャー・セキュリティ庁(CISA)が、Motex LANScope Endpoint Managerの重大な脆弱性CVE-2025-61932(CVSSスコア9.3)を既知の悪用される脆弱性(KEV)カタログ
@nakajimeeee
23 Oct 2025
463 Impressions
0 Retweets
4 Likes
2 Bookmarks
0 Replies
0 Quotes
[
{
"nodes": [
{
"negate": false,
"cpeMatch": [
{
"criteria": "cpe:2.3:a:motex:lanscope_endpoint_manager:*:*:*:*:on-premise:*:*:*",
"vulnerable": true,
"matchCriteriaId": "F9AF3F85-064B-469C-B530-7264EF91A04F",
"versionEndExcluding": "9.3.2.7"
},
{
"criteria": "cpe:2.3:a:motex:lanscope_endpoint_manager:*:*:*:*:on-premise:*:*:*",
"vulnerable": true,
"matchCriteriaId": "99DC2ADE-F5D6-45F9-B529-11C492FCDD31",
"versionEndExcluding": "9.3.3.9",
"versionStartIncluding": "9.3.3.0"
},
{
"criteria": "cpe:2.3:a:motex:lanscope_endpoint_manager:*:*:*:*:on-premise:*:*:*",
"vulnerable": true,
"matchCriteriaId": "431F6B9C-8A9C-45FD-B287-E9E1D2B3ECEE",
"versionEndExcluding": "9.4.0.5",
"versionStartIncluding": "9.4.0.0"
},
{
"criteria": "cpe:2.3:a:motex:lanscope_endpoint_manager:*:*:*:*:on-premise:*:*:*",
"vulnerable": true,
"matchCriteriaId": "B2398AA5-1CFD-41BA-8229-84DAC45D9382",
"versionEndExcluding": "9.4.1.5",
"versionStartIncluding": "9.4.1.0"
},
{
"criteria": "cpe:2.3:a:motex:lanscope_endpoint_manager:*:*:*:*:on-premise:*:*:*",
"vulnerable": true,
"matchCriteriaId": "0429C621-5DDE-4773-99D3-A20DC0C4798F",
"versionEndExcluding": "9.4.2.6",
"versionStartIncluding": "9.4.2.0"
},
{
"criteria": "cpe:2.3:a:motex:lanscope_endpoint_manager:*:*:*:*:on-premise:*:*:*",
"vulnerable": true,
"matchCriteriaId": "034F13F1-D926-4298-BCC9-DF424591CBF1",
"versionEndExcluding": "9.4.3.8",
"versionStartIncluding": "9.4.3.0"
},
{
"criteria": "cpe:2.3:a:motex:lanscope_endpoint_manager:*:*:*:*:on-premise:*:*:*",
"vulnerable": true,
"matchCriteriaId": "66C87047-9DE9-4CE8-80A9-AEBEB58B8402",
"versionEndExcluding": "9.4.4.6",
"versionStartIncluding": "9.4.4.0"
},
{
"criteria": "cpe:2.3:a:motex:lanscope_endpoint_manager:*:*:*:*:on-premise:*:*:*",
"vulnerable": true,
"matchCriteriaId": "8FF0B7EE-805A-431D-96E5-BF5BDDD3178E",
"versionEndExcluding": "9.4.5.4",
"versionStartIncluding": "9.4.5.0"
},
{
"criteria": "cpe:2.3:a:motex:lanscope_endpoint_manager:*:*:*:*:on-premise:*:*:*",
"vulnerable": true,
"matchCriteriaId": "21520838-C0C4-4F66-B5C6-1B6231225FF1",
"versionEndExcluding": "9.4.6.3",
"versionStartIncluding": "9.4.6.0"
},
{
"criteria": "cpe:2.3:a:motex:lanscope_endpoint_manager:*:*:*:*:on-premise:*:*:*",
"vulnerable": true,
"matchCriteriaId": "C669A3EF-3A71-46C0-B1FB-455CBB78B887",
"versionEndIncluding": "9.4.7.1",
"versionStartIncluding": "9.4.7.0"
}
],
"operator": "OR"
}
]
}
]