CVE-2025-61932

Published Oct 20, 2025

Last updated 18 days ago

Exploit knownCVSS critical 9.3
Lanscope Endpoint Manager

Overview

AI description

Automated description summarized from trusted sources.

CVE-2025-61932 is a vulnerability in Motex's Lanscope Endpoint Manager (On-Premises), specifically affecting the Client program (MR) and Detection Agent (DA). The vulnerability stems from the software's improper verification of the origin of incoming requests. This flaw allows a remote attacker to execute arbitrary code on the system by sending specially crafted packets. It has been confirmed that the vulnerability has been actively exploited in the wild. CISA has added CVE-2025-61932 to its Known Exploited Vulnerabilities (KEV) list.

Description
Lanscope Endpoint Manager (On-Premises) (Client program (MR) and Detection agent (DA)) improperly verifies the origin of incoming requests, allowing an attacker to execute arbitrary code by sending specially crafted packets.
Source
vultures@jpcert.or.jp
NVD status
Analyzed
Products
lanscope_endpoint_manager

Risk scores

CVSS 4.0

Type
Secondary
Base score
9.3
Impact score
-
Exploitability score
-
Vector string
CVSS:4.0/AV:N/AC:L/AT:N/PR:N/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N/E:X/CR:X/IR:X/AR:X/MAV:X/MAC:X/MAT:X/MPR:X/MUI:X/MVC:X/MVI:X/MVA:X/MSC:X/MSI:X/MSA:X/S:X/AU:X/R:X/V:X/RE:X/U:X
Severity
CRITICAL

CVSS 3.0

Type
Secondary
Base score
9.8
Impact score
5.9
Exploitability score
3.9
Vector string
CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H
Severity
CRITICAL

Known exploits

Data from CISA

Vulnerability name
Motex LANSCOPE Endpoint Manager Improper Verification of Source of a Communication Channel Vulnerability
Exploit added on
Oct 22, 2025
Exploit action due
Nov 12, 2025
Required action
Apply mitigations per vendor instructions, follow applicable BOD 22-01 guidance for cloud services, or discontinue use of the product if mitigations are unavailable.

Weaknesses

vultures@jpcert.or.jp
CWE-940

Social media

Hype score
Not currently trending
  1. Suspected Chinese APT “Tick” exploiting a critical flaw (CVE-2025-61932, CVSS 9.3) in Motex Lanscope Endpoint Manager to deploy a backdoor dubbed Gokcpdoor. 🎯 Targeted sectors align with espionage goals. (via @Sophos) Patch now. #CyberSecurity #APT #Infosec https://t

    @archie_sham

    10 Nov 2025

    4 Impressions

    0 Retweets

    0 Likes

    0 Bookmarks

    0 Replies

    0 Quotes

  2. [Dark Reading] APT 'Bronze Butler' Exploits Zero-Day to Root Japan Orgs. A critical security issue in a popular endpoint manager (CVE-2025-61932) allowed Chinese state-sponsored attackers to backdoor Japanese businesses. https://t.co/D0gZ5AHpsu

    @shah_sheikh

    6 Nov 2025

    9 Impressions

    0 Retweets

    0 Likes

    0 Bookmarks

    0 Replies

    0 Quotes

  3. 🚩 Critical Lanscope Endpoint Manager Bug (CVE-2025-61932) Being Actively Exploited https://t.co/cViXPHUS3m CISA has added this vulnerability to its Known Exploited Vulnerabilities catalog after confirming attackers are sending crafted packets that allow unauthenticated remot

    @Huntio

    4 Nov 2025

    797 Impressions

    5 Retweets

    4 Likes

    1 Bookmark

    0 Replies

    0 Quotes

  4. 🚨 Motex LANSCOPE Endpoint Manager [—] Nov 03, 2025 Product Security Advisory Report on CVE-2025-61932 Checkout our Threat Intelligence Platform: https://t.co/QuwNtEgYh1 https://t.co/QuwNtEgYh1 #ThreatIntelligence #CyberSecurity #Innovation #LLM https://t.co/IAu045dqiy

    @transilienceai

    3 Nov 2025

    6 Impressions

    0 Retweets

    0 Likes

    0 Bookmarks

    0 Replies

    0 Quotes

  5. 🚨 CHINA TICK GROUP ZERO-DAY RCE CVE-2025-61932: Hijacks Lanscope Endpoint Mgr w/ SYSTEM privs! Backdoors deployed. ⚠️ Details: https://t.co/LlW0U9vOlm 🔗 Sophos: https://t.co/jTIXguQPC1 @TheHackersNews @Sophos @JPCERT_EN #ZeroDay #RCE #cybersecuritystartupprogram

    @The_SatyaDVV

    2 Nov 2025

    90 Impressions

    0 Retweets

    0 Likes

    0 Bookmarks

    0 Replies

    0 Quotes

  6. Bronze Butler, a China-linked cyber-espionage group, exploited a zero-day vulnerability (vulnerability (CVE-2025-61932)) in Motex Lanscope Endpoint Manager to deploy the Gokcpdoor malware, exposing organizations to data theft and persistent backdoor access. This enables attackers

    @cybernewslive

    1 Nov 2025

    82 Impressions

    0 Retweets

    0 Likes

    0 Bookmarks

    0 Replies

    0 Quotes

  7. JPCERT-CC reported on CVE-2025-61932 (CVSS 9.8) last week, saying it was being actively exploited. New report says PRC-linked group BRONZE BUTLER has been actively exploiting this CVE, activity leverages an updated version of their Gokcpdoor backdoor https://t.co/lyTQ25ZZMB

    @cyber_megan

    1 Nov 2025

    264 Impressions

    0 Retweets

    1 Like

    0 Bookmarks

    1 Reply

    0 Quotes

  8. China-linked group Bronze Butler exploited a zero-day in Motex Lanscope Endpoint Manager (CVE-2025-61932) to deploy Gokcpdoor malware, enabling SYSTEM-level code execution and advanced C2 communication. #BronzeButler #China #ZeroDayExploit https://t.co/HaTdxdKSSq

    @TweetThreatNews

    1 Nov 2025

    110 Impressions

    0 Retweets

    0 Likes

    0 Bookmarks

    0 Replies

    0 Quotes

  9. 📝 𝐂𝐡𝐢𝐧𝐚-𝐥𝐢𝐧𝐤𝐞𝐝 𝐡𝐚𝐜𝐤𝐞𝐫𝐬 𝐞𝐱𝐩𝐥𝐨𝐢𝐭𝐞𝐝 𝐋𝐚𝐧𝐬𝐜𝐨𝐩𝐞 𝐟𝐥𝐚𝐰 𝐚𝐬 𝐚 𝐳𝐞𝐫𝐨-𝐝𝐚𝐲 𝐢𝐧 𝐚𝐭𝐭𝐚𝐜𝐤𝐬 • Bronze Butler exploited a

    @PurpleOps_io

    1 Nov 2025

    29 Impressions

    0 Retweets

    0 Likes

    0 Bookmarks

    0 Replies

    0 Quotes

  10. Critical Windows RCE Flaw (CVE-2025-61932) Allows SYSTEM Control and Ransomware Deployment. Read the full report on - https://t.co/ARLUjKNxxt https://t.co/tcy8d2cqBH

    @Iambivash007

    1 Nov 2025

    2 Impressions

    0 Retweets

    0 Likes

    0 Bookmarks

    0 Replies

    0 Quotes

  11. 🚨 Critical Lanscope vuln (CVE-2025-61932) lets attackers get SYSTEM access & hijack corporate hosts! Exploited by China-linked APT Tick — CVSS 9.3, JPCERT/CC alert. Patch ASAP! More: https://t.co/YQnpr5AvEK Follow us to support: @kernel_panic69

    @kernelpanicsec

    1 Nov 2025

    0 Impressions

    0 Retweets

    0 Likes

    0 Bookmarks

    0 Replies

    0 Quotes

  12. 🚨 LanScope Endpoint Manager Product Security Advisory [—] Nov 01, 2025 Comprehensive security advisory for LanScope Endpoint Manager, addressing CVE-2025-61932 and associated risks. Checkout our Threat Intelligence Platform: https://t.co/QuwNtEgYh1... https://t.co/gtHkRsgF9O

    @transilienceai

    1 Nov 2025

    46 Impressions

    0 Retweets

    0 Likes

    0 Bookmarks

    0 Replies

    0 Quotes

  13. 🚨 BRONZE BUTLER Threat Analysis [High] Nov 01, 2025 This report details the activities of the Chinese state-sponsored threat group BRONZE BUTLER, focusing on their exploitation of a zero-day vulnerability (CVE-2025-61932) in the Japanese-developed Motex LANSCOPE Endpoint... ht

    @transilienceai

    1 Nov 2025

    44 Impressions

    0 Retweets

    0 Likes

    0 Bookmarks

    0 Replies

    0 Quotes

  14. China’s BRONZE BUTLER group exploits zero-day flaws like CVE-2025-61932 to conduct stealthy #cyber espionage against #Japan , threatening regional #CyberSecurity & sovereignty. #GodMorningSaturday @CyberpunkGame @cybertruck https://t.co/ShAxvGWt9L

    @meng_yao1

    1 Nov 2025

    52 Impressions

    0 Retweets

    1 Like

    0 Bookmarks

    0 Replies

    0 Quotes

  15. 🚨 China-Linked Tick Group exploits Lanscope Zero-Day (CVE-2025-61932) to compromise corporate systems, posing a severe threat. https://t.co/AQlfWjhs5E

    @not2cleverdotme

    1 Nov 2025

    31 Impressions

    0 Retweets

    0 Likes

    0 Bookmarks

    0 Replies

    0 Quotes

  16. Falha crítica no Motex Lanscope exposta por grupo chinês: Vulnerabilidade CVE-2025-61932 permite execução remota com privilégios SYSTEM e tem sido explorada para instalar backdoor Gokcpdoor, facilitando espionagem e exfiltração de dados na Ásia. https://t.co/yl1WLJgFsl

    @caveiratech

    31 Oct 2025

    17 Impressions

    0 Retweets

    1 Like

    0 Bookmarks

    0 Replies

    0 Quotes

  17. China-Linked Group Exploits Lanscope Zero-Day to Hijack Systems A cyber espionage group called Tick exploited CVE-2025-61932, a critical flaw in Motex Lanscope Endpoint Manager, enabling remote attackers to execute SYSTEM-level commands on on-premise versions. JPCERT/CC issued h

    @Secwiserapp

    31 Oct 2025

    49 Impressions

    0 Retweets

    0 Likes

    0 Bookmarks

    0 Replies

    0 Quotes

  18. ⚠️ Des hackers chinois exploitent une faille critique (CVE-2025-61932, score 9.3) dans Motex Lanscope Endpoint Manager. Elle permet l’exécution de commandes SYSTEM et l’implantation du backdoor Gokcpdoor avec nouveaux canaux C2 multiplexés. 🚨 Attaques actives confirm

    @CyberHebdo

    31 Oct 2025

    3 Impressions

    0 Retweets

    0 Likes

    0 Bookmarks

    1 Reply

    0 Quotes

  19. 🇯🇵 🚨 BREAKING: China-linked Tick group exploiting critical Motex Lanscope Endpoint Manager flaw (CVE-2025-61932, CVSS 9.3) enabling remote SYSTEM execution on on-premise instances — JPCERT/CC alert. https://t.co/kYxTjpag9F #cyber #OSINT #Japan

    @STRATINT_AI

    31 Oct 2025

    73 Impressions

    0 Retweets

    1 Like

    0 Bookmarks

    0 Replies

    0 Quotes

  20. 📌 مجموعة التجسس السيبراني "تيك" مرتبطة بالصين استغلت ثغرة أمان حرجة في برنامج "موTex Lanscope" لإختراق الأنظمة المؤسساتية. الثغرة، المسجلة برقم CVE-2025-61932، تتيح

    @Cybercachear

    31 Oct 2025

    53 Impressions

    0 Retweets

    0 Likes

    0 Bookmarks

    0 Replies

    0 Quotes

  21. ⚠️ Chinese hackers are exploiting a critical 9.3 CVE (CVE-2025-61932) in Motex Lanscope Endpoint Manager. It lets them run SYSTEM-level commands and plant a Gokcpdoor backdoor with new multiplexed C2 channels. Active attacks confirmed ↓ https://t.co/HTJHzYQS4x

    @TheHackersNews

    31 Oct 2025

    9883 Impressions

    30 Retweets

    72 Likes

    12 Bookmarks

    0 Replies

    0 Quotes

  22. ⚠️ Chinese hackers are exploiting a critical 9.3 CVE (CVE-2025-61932) in Motex Lanscope Endpoint Manager. It lets them run SYSTEM-level commands and plant a Gokcpdoor backdoor with new multiplexed C2 channels. Active attacks confirmed ↓ https://the... https://t.co/JXaeaEY

    @IT_news_for_all

    31 Oct 2025

    10 Impressions

    0 Retweets

    0 Likes

    0 Bookmarks

    0 Replies

    0 Quotes

  23. In mid-2025 Sophos CTU researchers observed a campaign from the BRONZE BUTLER (also known as Tick) theat actor that exploited a zero-day vulnerability (CVE-2025-61932) in Motex LANSCOPE Endpoint Manager to steal confidential information. https://t.co/rzLSy3gZ5u https://t.co/7SxOg

    @virusbtn

    31 Oct 2025

    3608 Impressions

    11 Retweets

    38 Likes

    9 Bookmarks

    0 Replies

    1 Quote

  24. BRONZE BUTLER exploited zero-day CVE-2025-61932 in Motex LANSCOPE Endpoint Manager to execute SYSTEM-level commands, deploy Gokcpdoor and Havoc backdoors, and exfiltrate data via cloud storage and remote tunnels. #Japan #ZeroDay #Backdoor https://t.co/IyRPvTM9xY

    @TweetThreatNews

    31 Oct 2025

    20 Impressions

    0 Retweets

    0 Likes

    0 Bookmarks

    0 Replies

    0 Quotes

  25. 統合版 JPCERT/CC | Weekly Report: LANSCOPE エンドポイントマネージャー オンプレミス版における通信チャネルの送信元検証不備の脆弱性(CVE-2025-61932)について https://t.co/izDRQ1dDm6 #itsec_jp

    @itsec_jp

    31 Oct 2025

    2 Impressions

    0 Retweets

    0 Likes

    0 Bookmarks

    0 Replies

    0 Quotes

  26. A threat group known as BRONZE BUTLER has exploited a LANSCOPE zero-day vulnerability (CVE-2025-61932) in Japanese asset management software, raising concerns over cybersecurity in the industry. #CyberSecurity #Vulnerability https://t.co/o6vDZN8Ayk

    @Cyber_O51NT

    31 Oct 2025

    613 Impressions

    3 Retweets

    5 Likes

    0 Bookmarks

    0 Replies

    0 Quotes

  27. My latest blog post about a campaign exploiting the LANSCOPE vulnerability (CVE-2025-61932) has been published. / BRONZE BUTLER exploits Japanese asset management software vulnerability – Sophos News https://t.co/5MRWjeEy3r

    @you0708

    30 Oct 2025

    2974 Impressions

    9 Retweets

    20 Likes

    4 Bookmarks

    0 Replies

    2 Quotes

  28. BRONZE BUTLER Exploits Japanese Asset Management Software Vulnerability In 2025, CTU researchers identified a sophisticated BRONZE BUTLER campaign exploiting CVE-2025-61932 in Motex LANSCOPE to steal data. The Chinese state-sponsored group, active since 2010, used this zero-day

    @Secwiserapp

    30 Oct 2025

    124 Impressions

    1 Retweet

    2 Likes

    0 Bookmarks

    0 Replies

    0 Quotes

  29. 🔴 Critical LANSCOPE Endpoint Manager Flaw Exploited—CISA Confirms Active Attacks CVE-2025-61932 (CVSS 9.3) hit CISA's Known Exploited Vulnerabilities catalog after confirmed exploitation in Japan. The flaw affects Motex LANSCOPE Endpoint Manager—enterprise client managem

    @the_c_protocol

    28 Oct 2025

    0 Impressions

    0 Retweets

    0 Likes

    0 Bookmarks

    0 Replies

    0 Quotes

  30. 🚨 Lanscope Endpoint Manager [—] Oct 28, 2025 Critical security advisory for Lanscope Endpoint Manager, addressing remote code execution vulnerability CVE-2025-61932. Checkout our Threat Intelligence Platform: https://t.co/QuwNtEgYh1... https://t.co/lBeHGFMYx7

    @transilienceai

    28 Oct 2025

    8 Impressions

    0 Retweets

    0 Likes

    0 Bookmarks

    0 Replies

    0 Quotes

  31. 🚨 CVE-2025-61932 has been flagged as a critical RCE vulnerability targeting the on-prem Motex LANSCOPE Endpoint Manager. It’s actively being exploited in the wild, prompting CISA to add it to the Known Exploited Vulnerabilities catalog. Patch fast-this one’s not theoretica

    @AadilAmin05

    28 Oct 2025

    100 Impressions

    0 Retweets

    0 Likes

    0 Bookmarks

    0 Replies

    0 Quotes

  32. ⚠️ Critical CVEs Under Active Exploitation: Adobe Commerce, Lanscope, WSUS RCE Three critical vulnerabilities are actively exploited right now. CVE-2025-54236 (Adobe Commerce/Magento RCE)—attackers actively exploiting storefronts. CVE-2025-61932 (Lanscope Endpoint

    @the_c_protocol

    27 Oct 2025

    5 Impressions

    0 Retweets

    0 Likes

    0 Bookmarks

    0 Replies

    0 Quotes

  33. 🚨 LANSCOPE Endpoint Manager [—] Oct 27, 2025 Product Security Advisory Report on CVE-2025-61932 Checkout our Threat Intelligence Platform: https://t.co/QuwNtEgYh1 https://t.co/QuwNtEgYh1 #ThreatIntelligence #CyberSecurity #Innovation #LLM https://t.co/vouKWFTrkf

    @transilienceai

    27 Oct 2025

    13 Impressions

    0 Retweets

    0 Likes

    0 Bookmarks

    0 Replies

    0 Quotes

  34. Lanscope Endpoint Manager vulnerability exploited in zero-day attacks (CVE-2025-61932) - Help Net Security https://t.co/Pp7i3G9vIE

    @PVynckier

    26 Oct 2025

    81 Impressions

    0 Retweets

    3 Likes

    0 Bookmarks

    0 Replies

    0 Quotes

  35. ⚠️ Lanscope (Motex) critical RCE CVE-2025-61932 is being exploited in the wild. If you run Lanscope Endpoint Manager: patch or isolate the console, audit remote-command logs, and block access to management ports NOW. #Lanscope #CVE2025 #InfoSec

    @Wh1teCoon

    26 Oct 2025

    319 Impressions

    0 Retweets

    1 Like

    1 Bookmark

    0 Replies

    0 Quotes

  36. CISA has confirmed that a critical vulnerability (CVE-2025-61932) in Motex Lanscope Endpoint Manager is being actively exploited. The flaw, which has a CVSS score of 9.8, allows attackers to execute arbitrary code remotely on affected on-premises versions.

    @therealbelano

    25 Oct 2025

    577 Impressions

    5 Retweets

    10 Likes

    0 Bookmarks

    2 Replies

    0 Quotes

  37. 3/5: "CyberShield Hub's RCE radar: RedScan's AI sentinel flags packet anomalies & endpoint exploits—like CVE-2025-61932 chains—in real-time. Lightweight, local-first, no bloat. Windows solid, Linux/macOS inbound. Ever nuked a zero-day mid-manager?"

    @y_cybersecurity

    25 Oct 2025

    69 Impressions

    0 Retweets

    0 Likes

    0 Bookmarks

    0 Replies

    0 Quotes

  38. Thread: "Motex LANSCOPE RCE (CVE-2025-61932) Goes Wild: Unauth Code Exec on Endpoint Managers—Patch or Perish!" 🚨🔒 1/5: "🚨 ENDPOINT APOCALYPSE: CISA's KEV catalog just added CVE-2025-61932—a CVSS 9.8 RCE in Motex LANSCOPE Endpoint Manager (v9.4.7.2 & earlier).

    @y_cybersecurity

    25 Oct 2025

    56 Impressions

    0 Retweets

    0 Likes

    0 Bookmarks

    0 Replies

    0 Quotes

  39. RedScan v0.6 Unleashed: AI Defense + Ethical Hacking Bootcamp! 🚀🛡️ Oct 25, 2025, 02:58 PM WAT Cyber fam, RedScan v0.6 is live—slamming WSUS RCE (CVE-2025-59287) and LANSCOPE exploits (CVE-2025-61932) with AI, a SQLite DB, and VirusTotal ThreatFeed (500 free lookups/day)

    @CybershieldHub

    25 Oct 2025

    80 Impressions

    0 Retweets

    0 Likes

    1 Bookmark

    0 Replies

    0 Quotes

  40. RedScan v0.6 Unleashed: AI Defense + Ethical Hacking Bootcamp! 🚀🛡️ Oct 25, 2025, 02:58 PM WAT Cyber fam, RedScan v0.6 is live—slamming WSUS RCE (CVE-2025-59287) and LANSCOPE exploits (CVE-2025-61932) with AI, a SQLite DB, and VirusTotal ThreatFeed (500 free lookups/day)

    @CybershieldHub

    25 Oct 2025

    1 Impression

    0 Retweets

    0 Likes

    0 Bookmarks

    0 Replies

    0 Quotes

  41. Thread: "Motex LANSCOPE RCE (CVE-2025-61932) Goes Wild: Unauth Code Exec on Endpoint Managers—Patch or Perish!" 🚨🔒 1/5: "🚨 ENDPOINT APOCALYPSE: CISA's KEV catalog just added CVE-2025-61932—a CVSS 9.8 RCE in Motex LANSCOPE Endpoint Manager (v9.4.7.2 & earlier). Un

    @CybershieldHub

    25 Oct 2025

    47 Impressions

    0 Retweets

    0 Likes

    1 Bookmark

    1 Reply

    0 Quotes

  42. 🚨 Heads up, cybersecurity enthusiasts! A critical #zero-day vulnerability, CVE-2025-61932, in Lanscope Endpoint Manager, is being actively exploited in real-time attacks. Are your systems secured? 🛡️ Now's the time to double-check your defenses and patch up!

    @WideWatchers

    24 Oct 2025

    37 Impressions

    0 Retweets

    0 Likes

    0 Bookmarks

    0 Replies

    0 Quotes

  43. CISA has added a critical vulnerability, CVE-2025-61932 (CVSS v4 score: 9.3), affecting Motex Lanscope Endpoint Manager to its KEV catalog, confirming active exploitation. https://t.co/ZcQagg7Q60

    @securityRSS

    24 Oct 2025

    17 Impressions

    0 Retweets

    0 Likes

    0 Bookmarks

    0 Replies

    0 Quotes

  44. 🛡️ Cyber Threat Digest – 2025-10-24 KEV: CVE-2025-61932 — Motex LANSCOPE Endpoint Manager NVD: CVE-2025-11429 — flaw was found in News: Mozilla: New Firefox extensions must disclose… #cybersecurity #infosec #CVE More: https://t.co/J1fpKfnDnv

    @dpharristech

    24 Oct 2025

    0 Impressions

    0 Retweets

    0 Likes

    0 Bookmarks

    0 Replies

    0 Quotes

  45. Critical Lanscope Endpoint Manager Bug Exploited in Ongoing Cyberattacks. The vulnerability, CVE-2025-61932 (CVSS v4 score: 9.3), impacts on-premises versions of Lanscope Endpoint Manager, specifically Client program and Detection Agent. https://t.co/3SQtRszV7M https://t.co/IrZGT

    @riskigy

    24 Oct 2025

    46 Impressions

    0 Retweets

    0 Likes

    0 Bookmarks

    0 Replies

    0 Quotes

  46. csirt_it: ‼ #Exploited #Motex: rilevato sfruttamento in rete della CVE-2025-61932 relativa al prodotto #LanscopeEndpointManager Rischio:🟠 Tipologia: 🔸 Remote Code Execution 🔗 https://t.co/q0blcfUqn4 🔄 Aggiornamenti disponibili 🔄 https://t.co/HoSCx6RJpa

    @Vulcanux_

    24 Oct 2025

    29 Impressions

    0 Retweets

    0 Likes

    0 Bookmarks

    0 Replies

    0 Quotes

  47. 🚨 CRITICAL Lanscope Endpoint Manager flaw (CVE-2025-61932) is under active attack! Remote code execution possible—patch to 9.4.7.3+ ASAP to block backdoors. CISA sets 12 Nov 2025 remediation deadline. Details: https://t.co/J3mB5STFff... https://t.co/yU9Yb9B2tO

    @offseq

    24 Oct 2025

    99 Impressions

    0 Retweets

    0 Likes

    0 Bookmarks

    0 Replies

    0 Quotes

  48. Lanscope Endpoint Manager の脆弱性がゼロデイ攻撃で悪用される (CVE-2025-61932) Lanscope Endpoint Manager vulnerability exploited in zero-day attacks (CVE-2025-61932) #HelpNetSecurity (Oct 23) https://t.co/SQLJ3SWBeN

    @foxbook

    24 Oct 2025

    350 Impressions

    0 Retweets

    3 Likes

    1 Bookmark

    0 Replies

    0 Quotes

  49. CVE-2025-61932 Lanscope Endpoint Managerの脆弱性と影響 https://t.co/lnktun9nqp #Security #セキュリティー #ニュース

    @SecureShield_

    23 Oct 2025

    89 Impressions

    0 Retweets

    0 Likes

    0 Bookmarks

    0 Replies

    0 Quotes

  50. 【緊急脆弱性】米国サイバーセキュリティ・インフラストラクチャー・セキュリティ庁(CISA)が、Motex LANScope Endpoint Managerの重大な脆弱性CVE-2025-61932(CVSSスコア9.3)を既知の悪用される脆弱性(KEV)カタログ

    @nakajimeeee

    23 Oct 2025

    463 Impressions

    0 Retweets

    4 Likes

    2 Bookmarks

    0 Replies

    0 Quotes

Configurations