CVE-2025-61932

Published Oct 20, 2025

Last updated 5 months ago

Exploit knownCVSS critical 9.3
Lanscope Endpoint Manager

Overview

Description
Lanscope Endpoint Manager (On-Premises) (Client program (MR) and Detection agent (DA)) improperly verifies the origin of incoming requests, allowing an attacker to execute arbitrary code by sending specially crafted packets.
Source
vultures@jpcert.or.jp
NVD status
Analyzed
Products
lanscope_endpoint_manager

Risk scores

CVSS 4.0

Type
Secondary
Base score
9.3
Impact score
-
Exploitability score
-
Vector string
CVSS:4.0/AV:N/AC:L/AT:N/PR:N/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N/E:X/CR:X/IR:X/AR:X/MAV:X/MAC:X/MAT:X/MPR:X/MUI:X/MVC:X/MVI:X/MVA:X/MSC:X/MSI:X/MSA:X/S:X/AU:X/R:X/V:X/RE:X/U:X
Severity
CRITICAL

CVSS 3.0

Type
Secondary
Base score
9.8
Impact score
5.9
Exploitability score
3.9
Vector string
CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H
Severity
CRITICAL

Known exploits

Data from CISA

Vulnerability name
Motex LANSCOPE Endpoint Manager Improper Verification of Source of a Communication Channel Vulnerability
Exploit added on
Oct 22, 2025
Exploit action due
Nov 12, 2025
Required action
Apply mitigations per vendor instructions, follow applicable BOD 22-01 guidance for cloud services, or discontinue use of the product if mitigations are unavailable.

Weaknesses

vultures@jpcert.or.jp
CWE-940

Social media

Hype score
Not currently trending
  1. #VulnerabilityReport #ActiveExploitation Urgent Patch: Critical Lanscope Endpoint Manager RCE (CVE-2025-61932, CVSS 9.8) Under Active Exploitation https://t.co/CWiU8MoR8Z

    @Komodosec

    26 Nov 2025

    38 Impressions

    0 Retweets

    0 Likes

    0 Bookmarks

    0 Replies

    0 Quotes

  2. 🚩 Critical Lanscope Endpoint Manager Bug (CVE-2025-61932) Being Actively Exploited https://t.co/cViXPHUkdO CISA has added this vulnerability to its Known Exploited Vulnerabilities catalog after confirming attackers are sending crafted packets that allow unauthenticated remo

    @Huntio

    18 Nov 2025

    2345 Impressions

    8 Retweets

    20 Likes

    4 Bookmarks

    0 Replies

    0 Quotes

  3. Suspected Chinese APT “Tick” exploiting a critical flaw (CVE-2025-61932, CVSS 9.3) in Motex Lanscope Endpoint Manager to deploy a backdoor dubbed Gokcpdoor. 🎯 Targeted sectors align with espionage goals. (via @Sophos) Patch now. #CyberSecurity #APT #Infosec https://t

    @archie_sham

    10 Nov 2025

    4 Impressions

    0 Retweets

    0 Likes

    0 Bookmarks

    0 Replies

    0 Quotes

  4. [Dark Reading] APT 'Bronze Butler' Exploits Zero-Day to Root Japan Orgs. A critical security issue in a popular endpoint manager (CVE-2025-61932) allowed Chinese state-sponsored attackers to backdoor Japanese businesses. https://t.co/D0gZ5AHpsu

    @shah_sheikh

    6 Nov 2025

    9 Impressions

    0 Retweets

    0 Likes

    0 Bookmarks

    0 Replies

    0 Quotes

  5. 🚩 Critical Lanscope Endpoint Manager Bug (CVE-2025-61932) Being Actively Exploited https://t.co/cViXPHUS3m CISA has added this vulnerability to its Known Exploited Vulnerabilities catalog after confirming attackers are sending crafted packets that allow unauthenticated remot

    @Huntio

    4 Nov 2025

    797 Impressions

    5 Retweets

    4 Likes

    1 Bookmark

    0 Replies

    0 Quotes

  6. 🚨 Motex LANSCOPE Endpoint Manager [—] Nov 03, 2025 Product Security Advisory Report on CVE-2025-61932 Checkout our Threat Intelligence Platform: https://t.co/QuwNtEgYh1 https://t.co/QuwNtEgYh1 #ThreatIntelligence #CyberSecurity #Innovation #LLM https://t.co/IAu045dqiy

    @transilienceai

    3 Nov 2025

    6 Impressions

    0 Retweets

    0 Likes

    0 Bookmarks

    0 Replies

    0 Quotes

  7. 🚨 CHINA TICK GROUP ZERO-DAY RCE CVE-2025-61932: Hijacks Lanscope Endpoint Mgr w/ SYSTEM privs! Backdoors deployed. ⚠️ Details: https://t.co/LlW0U9vOlm 🔗 Sophos: https://t.co/jTIXguQPC1 @TheHackersNews @Sophos @JPCERT_EN #ZeroDay #RCE #cybersecuritystartupprogram

    @The_SatyaDVV

    2 Nov 2025

    90 Impressions

    0 Retweets

    0 Likes

    0 Bookmarks

    0 Replies

    0 Quotes

  8. Bronze Butler, a China-linked cyber-espionage group, exploited a zero-day vulnerability (vulnerability (CVE-2025-61932)) in Motex Lanscope Endpoint Manager to deploy the Gokcpdoor malware, exposing organizations to data theft and persistent backdoor access. This enables attackers

    @cybernewslive

    1 Nov 2025

    82 Impressions

    0 Retweets

    0 Likes

    0 Bookmarks

    0 Replies

    0 Quotes

  9. JPCERT-CC reported on CVE-2025-61932 (CVSS 9.8) last week, saying it was being actively exploited. New report says PRC-linked group BRONZE BUTLER has been actively exploiting this CVE, activity leverages an updated version of their Gokcpdoor backdoor https://t.co/lyTQ25ZZMB

    @cyber_megan

    1 Nov 2025

    264 Impressions

    0 Retweets

    1 Like

    0 Bookmarks

    1 Reply

    0 Quotes

  10. China-linked group Bronze Butler exploited a zero-day in Motex Lanscope Endpoint Manager (CVE-2025-61932) to deploy Gokcpdoor malware, enabling SYSTEM-level code execution and advanced C2 communication. #BronzeButler #China #ZeroDayExploit https://t.co/HaTdxdKSSq

    @TweetThreatNews

    1 Nov 2025

    110 Impressions

    0 Retweets

    0 Likes

    0 Bookmarks

    0 Replies

    0 Quotes

  11. 📝 𝐂𝐡𝐢𝐧𝐚-𝐥𝐢𝐧𝐤𝐞𝐝 𝐡𝐚𝐜𝐤𝐞𝐫𝐬 𝐞𝐱𝐩𝐥𝐨𝐢𝐭𝐞𝐝 𝐋𝐚𝐧𝐬𝐜𝐨𝐩𝐞 𝐟𝐥𝐚𝐰 𝐚𝐬 𝐚 𝐳𝐞𝐫𝐨-𝐝𝐚𝐲 𝐢𝐧 𝐚𝐭𝐭𝐚𝐜𝐤𝐬 • Bronze Butler exploited a

    @PurpleOps_io

    1 Nov 2025

    29 Impressions

    0 Retweets

    0 Likes

    0 Bookmarks

    0 Replies

    0 Quotes

  12. Critical Windows RCE Flaw (CVE-2025-61932) Allows SYSTEM Control and Ransomware Deployment. Read the full report on - https://t.co/ARLUjKNxxt https://t.co/tcy8d2cqBH

    @cyberbivash

    1 Nov 2025

    2 Impressions

    0 Retweets

    0 Likes

    0 Bookmarks

    0 Replies

    0 Quotes

  13. 🚨 Critical Lanscope vuln (CVE-2025-61932) lets attackers get SYSTEM access & hijack corporate hosts! Exploited by China-linked APT Tick — CVSS 9.3, JPCERT/CC alert. Patch ASAP! More: https://t.co/YQnpr5AvEK Follow us to support: @kernel_panic69

    @kernelpanicsec

    1 Nov 2025

    0 Impressions

    0 Retweets

    0 Likes

    0 Bookmarks

    0 Replies

    0 Quotes

  14. 🚨 LanScope Endpoint Manager Product Security Advisory [—] Nov 01, 2025 Comprehensive security advisory for LanScope Endpoint Manager, addressing CVE-2025-61932 and associated risks. Checkout our Threat Intelligence Platform: https://t.co/QuwNtEgYh1... https://t.co/gtHkRsgF9O

    @transilienceai

    1 Nov 2025

    46 Impressions

    0 Retweets

    0 Likes

    0 Bookmarks

    0 Replies

    0 Quotes

  15. 🚨 BRONZE BUTLER Threat Analysis [High] Nov 01, 2025 This report details the activities of the Chinese state-sponsored threat group BRONZE BUTLER, focusing on their exploitation of a zero-day vulnerability (CVE-2025-61932) in the Japanese-developed Motex LANSCOPE Endpoint... ht

    @transilienceai

    1 Nov 2025

    44 Impressions

    0 Retweets

    0 Likes

    0 Bookmarks

    0 Replies

    0 Quotes

  16. China’s BRONZE BUTLER group exploits zero-day flaws like CVE-2025-61932 to conduct stealthy #cyber espionage against #Japan , threatening regional #CyberSecurity & sovereignty. #GodMorningSaturday @CyberpunkGame @cybertruck https://t.co/ShAxvGWt9L

    @meng_yao1

    1 Nov 2025

    52 Impressions

    0 Retweets

    1 Like

    0 Bookmarks

    0 Replies

    0 Quotes

  17. 🚨 China-Linked Tick Group exploits Lanscope Zero-Day (CVE-2025-61932) to compromise corporate systems, posing a severe threat. https://t.co/AQlfWjhs5E

    @not2cleverdotme

    1 Nov 2025

    31 Impressions

    0 Retweets

    0 Likes

    0 Bookmarks

    0 Replies

    0 Quotes

  18. Falha crítica no Motex Lanscope exposta por grupo chinês: Vulnerabilidade CVE-2025-61932 permite execução remota com privilégios SYSTEM e tem sido explorada para instalar backdoor Gokcpdoor, facilitando espionagem e exfiltração de dados na Ásia. https://t.co/yl1WLJgFsl

    @caveiratech

    31 Oct 2025

    17 Impressions

    0 Retweets

    1 Like

    0 Bookmarks

    0 Replies

    0 Quotes

  19. China-Linked Group Exploits Lanscope Zero-Day to Hijack Systems A cyber espionage group called Tick exploited CVE-2025-61932, a critical flaw in Motex Lanscope Endpoint Manager, enabling remote attackers to execute SYSTEM-level commands on on-premise versions. JPCERT/CC issued h

    @Secwiserapp

    31 Oct 2025

    49 Impressions

    0 Retweets

    0 Likes

    0 Bookmarks

    0 Replies

    0 Quotes

  20. ⚠️ Des hackers chinois exploitent une faille critique (CVE-2025-61932, score 9.3) dans Motex Lanscope Endpoint Manager. Elle permet l’exécution de commandes SYSTEM et l’implantation du backdoor Gokcpdoor avec nouveaux canaux C2 multiplexés. 🚨 Attaques actives confirm

    @CyberHebdo

    31 Oct 2025

    3 Impressions

    0 Retweets

    0 Likes

    0 Bookmarks

    1 Reply

    0 Quotes

  21. 🇯🇵 🚨 BREAKING: China-linked Tick group exploiting critical Motex Lanscope Endpoint Manager flaw (CVE-2025-61932, CVSS 9.3) enabling remote SYSTEM execution on on-premise instances — JPCERT/CC alert. https://t.co/kYxTjpag9F #cyber #OSINT #Japan

    @STRATINT_AI

    31 Oct 2025

    73 Impressions

    0 Retweets

    1 Like

    0 Bookmarks

    0 Replies

    0 Quotes

  22. 📌 مجموعة التجسس السيبراني "تيك" مرتبطة بالصين استغلت ثغرة أمان حرجة في برنامج "موTex Lanscope" لإختراق الأنظمة المؤسساتية. الثغرة، المسجلة برقم CVE-2025-61932، تتيح

    @Cybercachear

    31 Oct 2025

    53 Impressions

    0 Retweets

    0 Likes

    0 Bookmarks

    0 Replies

    0 Quotes

  23. ⚠️ Chinese hackers are exploiting a critical 9.3 CVE (CVE-2025-61932) in Motex Lanscope Endpoint Manager. It lets them run SYSTEM-level commands and plant a Gokcpdoor backdoor with new multiplexed C2 channels. Active attacks confirmed ↓ https://t.co/HTJHzYQS4x

    @TheHackersNews

    31 Oct 2025

    9883 Impressions

    30 Retweets

    72 Likes

    12 Bookmarks

    0 Replies

    0 Quotes

  24. ⚠️ Chinese hackers are exploiting a critical 9.3 CVE (CVE-2025-61932) in Motex Lanscope Endpoint Manager. It lets them run SYSTEM-level commands and plant a Gokcpdoor backdoor with new multiplexed C2 channels. Active attacks confirmed ↓ https://the... https://t.co/JXaeaEY

    @IT_news_for_all

    31 Oct 2025

    10 Impressions

    0 Retweets

    0 Likes

    0 Bookmarks

    0 Replies

    0 Quotes

  25. In mid-2025 Sophos CTU researchers observed a campaign from the BRONZE BUTLER (also known as Tick) theat actor that exploited a zero-day vulnerability (CVE-2025-61932) in Motex LANSCOPE Endpoint Manager to steal confidential information. https://t.co/rzLSy3gZ5u https://t.co/7SxOg

    @virusbtn

    31 Oct 2025

    3608 Impressions

    11 Retweets

    38 Likes

    9 Bookmarks

    0 Replies

    1 Quote

  26. BRONZE BUTLER exploited zero-day CVE-2025-61932 in Motex LANSCOPE Endpoint Manager to execute SYSTEM-level commands, deploy Gokcpdoor and Havoc backdoors, and exfiltrate data via cloud storage and remote tunnels. #Japan #ZeroDay #Backdoor https://t.co/IyRPvTM9xY

    @TweetThreatNews

    31 Oct 2025

    20 Impressions

    0 Retweets

    0 Likes

    0 Bookmarks

    0 Replies

    0 Quotes

  27. 統合版 JPCERT/CC | Weekly Report: LANSCOPE エンドポイントマネージャー オンプレミス版における通信チャネルの送信元検証不備の脆弱性(CVE-2025-61932)について https://t.co/izDRQ1dDm6 #itsec_jp

    @itsec_jp

    31 Oct 2025

    2 Impressions

    0 Retweets

    0 Likes

    0 Bookmarks

    0 Replies

    0 Quotes

  28. A threat group known as BRONZE BUTLER has exploited a LANSCOPE zero-day vulnerability (CVE-2025-61932) in Japanese asset management software, raising concerns over cybersecurity in the industry. #CyberSecurity #Vulnerability https://t.co/o6vDZN8Ayk

    @Cyber_O51NT

    31 Oct 2025

    613 Impressions

    3 Retweets

    5 Likes

    0 Bookmarks

    0 Replies

    0 Quotes

  29. My latest blog post about a campaign exploiting the LANSCOPE vulnerability (CVE-2025-61932) has been published. / BRONZE BUTLER exploits Japanese asset management software vulnerability – Sophos News https://t.co/5MRWjeEy3r

    @you0708

    30 Oct 2025

    2974 Impressions

    9 Retweets

    20 Likes

    4 Bookmarks

    0 Replies

    2 Quotes

  30. BRONZE BUTLER Exploits Japanese Asset Management Software Vulnerability In 2025, CTU researchers identified a sophisticated BRONZE BUTLER campaign exploiting CVE-2025-61932 in Motex LANSCOPE to steal data. The Chinese state-sponsored group, active since 2010, used this zero-day

    @Secwiserapp

    30 Oct 2025

    124 Impressions

    1 Retweet

    2 Likes

    0 Bookmarks

    0 Replies

    0 Quotes

  31. 🔴 Critical LANSCOPE Endpoint Manager Flaw Exploited—CISA Confirms Active Attacks CVE-2025-61932 (CVSS 9.3) hit CISA's Known Exploited Vulnerabilities catalog after confirmed exploitation in Japan. The flaw affects Motex LANSCOPE Endpoint Manager—enterprise client managem

    @the_c_protocol

    28 Oct 2025

    0 Impressions

    0 Retweets

    0 Likes

    0 Bookmarks

    0 Replies

    0 Quotes

  32. 🚨 Lanscope Endpoint Manager [—] Oct 28, 2025 Critical security advisory for Lanscope Endpoint Manager, addressing remote code execution vulnerability CVE-2025-61932. Checkout our Threat Intelligence Platform: https://t.co/QuwNtEgYh1... https://t.co/lBeHGFMYx7

    @transilienceai

    28 Oct 2025

    8 Impressions

    0 Retweets

    0 Likes

    0 Bookmarks

    0 Replies

    0 Quotes

  33. 🚨 CVE-2025-61932 has been flagged as a critical RCE vulnerability targeting the on-prem Motex LANSCOPE Endpoint Manager. It’s actively being exploited in the wild, prompting CISA to add it to the Known Exploited Vulnerabilities catalog. Patch fast-this one’s not theoretica

    @AadilAmin05

    28 Oct 2025

    100 Impressions

    0 Retweets

    0 Likes

    0 Bookmarks

    0 Replies

    0 Quotes

  34. ⚠️ Critical CVEs Under Active Exploitation: Adobe Commerce, Lanscope, WSUS RCE Three critical vulnerabilities are actively exploited right now. CVE-2025-54236 (Adobe Commerce/Magento RCE)—attackers actively exploiting storefronts. CVE-2025-61932 (Lanscope Endpoint

    @the_c_protocol

    27 Oct 2025

    5 Impressions

    0 Retweets

    0 Likes

    0 Bookmarks

    0 Replies

    0 Quotes

  35. 🚨 LANSCOPE Endpoint Manager [—] Oct 27, 2025 Product Security Advisory Report on CVE-2025-61932 Checkout our Threat Intelligence Platform: https://t.co/QuwNtEgYh1 https://t.co/QuwNtEgYh1 #ThreatIntelligence #CyberSecurity #Innovation #LLM https://t.co/vouKWFTrkf

    @transilienceai

    27 Oct 2025

    13 Impressions

    0 Retweets

    0 Likes

    0 Bookmarks

    0 Replies

    0 Quotes

  36. Lanscope Endpoint Manager vulnerability exploited in zero-day attacks (CVE-2025-61932) - Help Net Security https://t.co/Pp7i3G9vIE

    @PVynckier

    26 Oct 2025

    81 Impressions

    0 Retweets

    3 Likes

    0 Bookmarks

    0 Replies

    0 Quotes

  37. ⚠️ Lanscope (Motex) critical RCE CVE-2025-61932 is being exploited in the wild. If you run Lanscope Endpoint Manager: patch or isolate the console, audit remote-command logs, and block access to management ports NOW. #Lanscope #CVE2025 #InfoSec

    @Wh1teCoon

    26 Oct 2025

    319 Impressions

    0 Retweets

    1 Like

    1 Bookmark

    0 Replies

    0 Quotes

  38. CISA has confirmed that a critical vulnerability (CVE-2025-61932) in Motex Lanscope Endpoint Manager is being actively exploited. The flaw, which has a CVSS score of 9.8, allows attackers to execute arbitrary code remotely on affected on-premises versions.

    @therealbelano

    25 Oct 2025

    577 Impressions

    5 Retweets

    10 Likes

    0 Bookmarks

    2 Replies

    0 Quotes

  39. 3/5: "CyberShield Hub's RCE radar: RedScan's AI sentinel flags packet anomalies & endpoint exploits—like CVE-2025-61932 chains—in real-time. Lightweight, local-first, no bloat. Windows solid, Linux/macOS inbound. Ever nuked a zero-day mid-manager?"

    @y_cybersecurity

    25 Oct 2025

    69 Impressions

    0 Retweets

    0 Likes

    0 Bookmarks

    0 Replies

    0 Quotes

  40. Thread: "Motex LANSCOPE RCE (CVE-2025-61932) Goes Wild: Unauth Code Exec on Endpoint Managers—Patch or Perish!" 🚨🔒 1/5: "🚨 ENDPOINT APOCALYPSE: CISA's KEV catalog just added CVE-2025-61932—a CVSS 9.8 RCE in Motex LANSCOPE Endpoint Manager (v9.4.7.2 & earlier).

    @y_cybersecurity

    25 Oct 2025

    56 Impressions

    0 Retweets

    0 Likes

    0 Bookmarks

    0 Replies

    0 Quotes

  41. RedScan v0.6 Unleashed: AI Defense + Ethical Hacking Bootcamp! 🚀🛡️ Oct 25, 2025, 02:58 PM WAT Cyber fam, RedScan v0.6 is live—slamming WSUS RCE (CVE-2025-59287) and LANSCOPE exploits (CVE-2025-61932) with AI, a SQLite DB, and VirusTotal ThreatFeed (500 free lookups/day)

    @CybershieldHub

    25 Oct 2025

    80 Impressions

    0 Retweets

    0 Likes

    1 Bookmark

    0 Replies

    0 Quotes

  42. RedScan v0.6 Unleashed: AI Defense + Ethical Hacking Bootcamp! 🚀🛡️ Oct 25, 2025, 02:58 PM WAT Cyber fam, RedScan v0.6 is live—slamming WSUS RCE (CVE-2025-59287) and LANSCOPE exploits (CVE-2025-61932) with AI, a SQLite DB, and VirusTotal ThreatFeed (500 free lookups/day)

    @CybershieldHub

    25 Oct 2025

    1 Impression

    0 Retweets

    0 Likes

    0 Bookmarks

    0 Replies

    0 Quotes

  43. Thread: "Motex LANSCOPE RCE (CVE-2025-61932) Goes Wild: Unauth Code Exec on Endpoint Managers—Patch or Perish!" 🚨🔒 1/5: "🚨 ENDPOINT APOCALYPSE: CISA's KEV catalog just added CVE-2025-61932—a CVSS 9.8 RCE in Motex LANSCOPE Endpoint Manager (v9.4.7.2 & earlier). Un

    @CybershieldHub

    25 Oct 2025

    47 Impressions

    0 Retweets

    0 Likes

    1 Bookmark

    1 Reply

    0 Quotes

  44. 🚨 Heads up, cybersecurity enthusiasts! A critical #zero-day vulnerability, CVE-2025-61932, in Lanscope Endpoint Manager, is being actively exploited in real-time attacks. Are your systems secured? 🛡️ Now's the time to double-check your defenses and patch up!

    @WideWatchers

    24 Oct 2025

    37 Impressions

    0 Retweets

    0 Likes

    0 Bookmarks

    0 Replies

    0 Quotes

  45. CISA has added a critical vulnerability, CVE-2025-61932 (CVSS v4 score: 9.3), affecting Motex Lanscope Endpoint Manager to its KEV catalog, confirming active exploitation. https://t.co/ZcQagg7Q60

    @securityRSS

    24 Oct 2025

    17 Impressions

    0 Retweets

    0 Likes

    0 Bookmarks

    0 Replies

    0 Quotes

  46. 🛡️ Cyber Threat Digest – 2025-10-24 KEV: CVE-2025-61932 — Motex LANSCOPE Endpoint Manager NVD: CVE-2025-11429 — flaw was found in News: Mozilla: New Firefox extensions must disclose… #cybersecurity #infosec #CVE More: https://t.co/J1fpKfnDnv

    @dpharristech

    24 Oct 2025

    0 Impressions

    0 Retweets

    0 Likes

    0 Bookmarks

    0 Replies

    0 Quotes

  47. Critical Lanscope Endpoint Manager Bug Exploited in Ongoing Cyberattacks. The vulnerability, CVE-2025-61932 (CVSS v4 score: 9.3), impacts on-premises versions of Lanscope Endpoint Manager, specifically Client program and Detection Agent. https://t.co/3SQtRszV7M https://t.co/IrZGT

    @riskigy

    24 Oct 2025

    46 Impressions

    0 Retweets

    0 Likes

    0 Bookmarks

    0 Replies

    0 Quotes

  48. csirt_it: ‼ #Exploited #Motex: rilevato sfruttamento in rete della CVE-2025-61932 relativa al prodotto #LanscopeEndpointManager Rischio:🟠 Tipologia: 🔸 Remote Code Execution 🔗 https://t.co/q0blcfUqn4 🔄 Aggiornamenti disponibili 🔄 https://t.co/HoSCx6RJpa

    @Vulcanux_

    24 Oct 2025

    29 Impressions

    0 Retweets

    0 Likes

    0 Bookmarks

    0 Replies

    0 Quotes

  49. 🚨 CRITICAL Lanscope Endpoint Manager flaw (CVE-2025-61932) is under active attack! Remote code execution possible—patch to 9.4.7.3+ ASAP to block backdoors. CISA sets 12 Nov 2025 remediation deadline. Details: https://t.co/J3mB5STFff... https://t.co/yU9Yb9B2tO

    @offseq

    24 Oct 2025

    99 Impressions

    0 Retweets

    0 Likes

    0 Bookmarks

    0 Replies

    0 Quotes

  50. Lanscope Endpoint Manager の脆弱性がゼロデイ攻撃で悪用される (CVE-2025-61932) Lanscope Endpoint Manager vulnerability exploited in zero-day attacks (CVE-2025-61932) #HelpNetSecurity (Oct 23) https://t.co/SQLJ3SWBeN

    @foxbook

    24 Oct 2025

    350 Impressions

    0 Retweets

    3 Likes

    1 Bookmark

    0 Replies

    0 Quotes

Configurations