CVE-2025-61932
Published Oct 20, 2025
Last updated 5 months ago
- Description
- Lanscope Endpoint Manager (On-Premises) (Client program (MR) and Detection agent (DA)) improperly verifies the origin of incoming requests, allowing an attacker to execute arbitrary code by sending specially crafted packets.
- Source
- vultures@jpcert.or.jp
- NVD status
- Analyzed
- Products
- lanscope_endpoint_manager
CVSS 4.0
- Type
- Secondary
- Base score
- 9.3
- Impact score
- -
- Exploitability score
- -
- Vector string
- CVSS:4.0/AV:N/AC:L/AT:N/PR:N/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N/E:X/CR:X/IR:X/AR:X/MAV:X/MAC:X/MAT:X/MPR:X/MUI:X/MVC:X/MVI:X/MVA:X/MSC:X/MSI:X/MSA:X/S:X/AU:X/R:X/V:X/RE:X/U:X
- Severity
- CRITICAL
CVSS 3.0
- Type
- Secondary
- Base score
- 9.8
- Impact score
- 5.9
- Exploitability score
- 3.9
- Vector string
- CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H
- Severity
- CRITICAL
Data from CISA
- Vulnerability name
- Motex LANSCOPE Endpoint Manager Improper Verification of Source of a Communication Channel Vulnerability
- Exploit added on
- Oct 22, 2025
- Exploit action due
- Nov 12, 2025
- Required action
- Apply mitigations per vendor instructions, follow applicable BOD 22-01 guidance for cloud services, or discontinue use of the product if mitigations are unavailable.
- vultures@jpcert.or.jp
- CWE-940
- Hype score
- Not currently trending
#VulnerabilityReport #ActiveExploitation Urgent Patch: Critical Lanscope Endpoint Manager RCE (CVE-2025-61932, CVSS 9.8) Under Active Exploitation https://t.co/CWiU8MoR8Z
@Komodosec
26 Nov 2025
38 Impressions
0 Retweets
0 Likes
0 Bookmarks
0 Replies
0 Quotes
🚩 Critical Lanscope Endpoint Manager Bug (CVE-2025-61932) Being Actively Exploited https://t.co/cViXPHUkdO CISA has added this vulnerability to its Known Exploited Vulnerabilities catalog after confirming attackers are sending crafted packets that allow unauthenticated remo
@Huntio
18 Nov 2025
2345 Impressions
8 Retweets
20 Likes
4 Bookmarks
0 Replies
0 Quotes
Suspected Chinese APT “Tick” exploiting a critical flaw (CVE-2025-61932, CVSS 9.3) in Motex Lanscope Endpoint Manager to deploy a backdoor dubbed Gokcpdoor. 🎯 Targeted sectors align with espionage goals. (via @Sophos) Patch now. #CyberSecurity #APT #Infosec https://t
@archie_sham
10 Nov 2025
4 Impressions
0 Retweets
0 Likes
0 Bookmarks
0 Replies
0 Quotes
[Dark Reading] APT 'Bronze Butler' Exploits Zero-Day to Root Japan Orgs. A critical security issue in a popular endpoint manager (CVE-2025-61932) allowed Chinese state-sponsored attackers to backdoor Japanese businesses. https://t.co/D0gZ5AHpsu
@shah_sheikh
6 Nov 2025
9 Impressions
0 Retweets
0 Likes
0 Bookmarks
0 Replies
0 Quotes
🚩 Critical Lanscope Endpoint Manager Bug (CVE-2025-61932) Being Actively Exploited https://t.co/cViXPHUS3m CISA has added this vulnerability to its Known Exploited Vulnerabilities catalog after confirming attackers are sending crafted packets that allow unauthenticated remot
@Huntio
4 Nov 2025
797 Impressions
5 Retweets
4 Likes
1 Bookmark
0 Replies
0 Quotes
🚨 Motex LANSCOPE Endpoint Manager [—] Nov 03, 2025 Product Security Advisory Report on CVE-2025-61932 Checkout our Threat Intelligence Platform: https://t.co/QuwNtEgYh1 https://t.co/QuwNtEgYh1 #ThreatIntelligence #CyberSecurity #Innovation #LLM https://t.co/IAu045dqiy
@transilienceai
3 Nov 2025
6 Impressions
0 Retweets
0 Likes
0 Bookmarks
0 Replies
0 Quotes
🚨 CHINA TICK GROUP ZERO-DAY RCE CVE-2025-61932: Hijacks Lanscope Endpoint Mgr w/ SYSTEM privs! Backdoors deployed. ⚠️ Details: https://t.co/LlW0U9vOlm 🔗 Sophos: https://t.co/jTIXguQPC1 @TheHackersNews @Sophos @JPCERT_EN #ZeroDay #RCE #cybersecuritystartupprogram
@The_SatyaDVV
2 Nov 2025
90 Impressions
0 Retweets
0 Likes
0 Bookmarks
0 Replies
0 Quotes
Bronze Butler, a China-linked cyber-espionage group, exploited a zero-day vulnerability (vulnerability (CVE-2025-61932)) in Motex Lanscope Endpoint Manager to deploy the Gokcpdoor malware, exposing organizations to data theft and persistent backdoor access. This enables attackers
@cybernewslive
1 Nov 2025
82 Impressions
0 Retweets
0 Likes
0 Bookmarks
0 Replies
0 Quotes
JPCERT-CC reported on CVE-2025-61932 (CVSS 9.8) last week, saying it was being actively exploited. New report says PRC-linked group BRONZE BUTLER has been actively exploiting this CVE, activity leverages an updated version of their Gokcpdoor backdoor https://t.co/lyTQ25ZZMB
@cyber_megan
1 Nov 2025
264 Impressions
0 Retweets
1 Like
0 Bookmarks
1 Reply
0 Quotes
China-linked group Bronze Butler exploited a zero-day in Motex Lanscope Endpoint Manager (CVE-2025-61932) to deploy Gokcpdoor malware, enabling SYSTEM-level code execution and advanced C2 communication. #BronzeButler #China #ZeroDayExploit https://t.co/HaTdxdKSSq
@TweetThreatNews
1 Nov 2025
110 Impressions
0 Retweets
0 Likes
0 Bookmarks
0 Replies
0 Quotes
📝 𝐂𝐡𝐢𝐧𝐚-𝐥𝐢𝐧𝐤𝐞𝐝 𝐡𝐚𝐜𝐤𝐞𝐫𝐬 𝐞𝐱𝐩𝐥𝐨𝐢𝐭𝐞𝐝 𝐋𝐚𝐧𝐬𝐜𝐨𝐩𝐞 𝐟𝐥𝐚𝐰 𝐚𝐬 𝐚 𝐳𝐞𝐫𝐨-𝐝𝐚𝐲 𝐢𝐧 𝐚𝐭𝐭𝐚𝐜𝐤𝐬 • Bronze Butler exploited a
@PurpleOps_io
1 Nov 2025
29 Impressions
0 Retweets
0 Likes
0 Bookmarks
0 Replies
0 Quotes
Critical Windows RCE Flaw (CVE-2025-61932) Allows SYSTEM Control and Ransomware Deployment. Read the full report on - https://t.co/ARLUjKNxxt https://t.co/tcy8d2cqBH
@cyberbivash
1 Nov 2025
2 Impressions
0 Retweets
0 Likes
0 Bookmarks
0 Replies
0 Quotes
🚨 Critical Lanscope vuln (CVE-2025-61932) lets attackers get SYSTEM access & hijack corporate hosts! Exploited by China-linked APT Tick — CVSS 9.3, JPCERT/CC alert. Patch ASAP! More: https://t.co/YQnpr5AvEK Follow us to support: @kernel_panic69
@kernelpanicsec
1 Nov 2025
0 Impressions
0 Retweets
0 Likes
0 Bookmarks
0 Replies
0 Quotes
🚨 LanScope Endpoint Manager Product Security Advisory [—] Nov 01, 2025 Comprehensive security advisory for LanScope Endpoint Manager, addressing CVE-2025-61932 and associated risks. Checkout our Threat Intelligence Platform: https://t.co/QuwNtEgYh1... https://t.co/gtHkRsgF9O
@transilienceai
1 Nov 2025
46 Impressions
0 Retweets
0 Likes
0 Bookmarks
0 Replies
0 Quotes
🚨 BRONZE BUTLER Threat Analysis [High] Nov 01, 2025 This report details the activities of the Chinese state-sponsored threat group BRONZE BUTLER, focusing on their exploitation of a zero-day vulnerability (CVE-2025-61932) in the Japanese-developed Motex LANSCOPE Endpoint... ht
@transilienceai
1 Nov 2025
44 Impressions
0 Retweets
0 Likes
0 Bookmarks
0 Replies
0 Quotes
China’s BRONZE BUTLER group exploits zero-day flaws like CVE-2025-61932 to conduct stealthy #cyber espionage against #Japan , threatening regional #CyberSecurity & sovereignty. #GodMorningSaturday @CyberpunkGame @cybertruck https://t.co/ShAxvGWt9L
@meng_yao1
1 Nov 2025
52 Impressions
0 Retweets
1 Like
0 Bookmarks
0 Replies
0 Quotes
🚨 China-Linked Tick Group exploits Lanscope Zero-Day (CVE-2025-61932) to compromise corporate systems, posing a severe threat. https://t.co/AQlfWjhs5E
@not2cleverdotme
1 Nov 2025
31 Impressions
0 Retweets
0 Likes
0 Bookmarks
0 Replies
0 Quotes
Falha crítica no Motex Lanscope exposta por grupo chinês: Vulnerabilidade CVE-2025-61932 permite execução remota com privilégios SYSTEM e tem sido explorada para instalar backdoor Gokcpdoor, facilitando espionagem e exfiltração de dados na Ásia. https://t.co/yl1WLJgFsl
@caveiratech
31 Oct 2025
17 Impressions
0 Retweets
1 Like
0 Bookmarks
0 Replies
0 Quotes
China-Linked Group Exploits Lanscope Zero-Day to Hijack Systems A cyber espionage group called Tick exploited CVE-2025-61932, a critical flaw in Motex Lanscope Endpoint Manager, enabling remote attackers to execute SYSTEM-level commands on on-premise versions. JPCERT/CC issued h
@Secwiserapp
31 Oct 2025
49 Impressions
0 Retweets
0 Likes
0 Bookmarks
0 Replies
0 Quotes
⚠️ Des hackers chinois exploitent une faille critique (CVE-2025-61932, score 9.3) dans Motex Lanscope Endpoint Manager. Elle permet l’exécution de commandes SYSTEM et l’implantation du backdoor Gokcpdoor avec nouveaux canaux C2 multiplexés. 🚨 Attaques actives confirm
@CyberHebdo
31 Oct 2025
3 Impressions
0 Retweets
0 Likes
0 Bookmarks
1 Reply
0 Quotes
🇯🇵 🚨 BREAKING: China-linked Tick group exploiting critical Motex Lanscope Endpoint Manager flaw (CVE-2025-61932, CVSS 9.3) enabling remote SYSTEM execution on on-premise instances — JPCERT/CC alert. https://t.co/kYxTjpag9F #cyber #OSINT #Japan
@STRATINT_AI
31 Oct 2025
73 Impressions
0 Retweets
1 Like
0 Bookmarks
0 Replies
0 Quotes
📌 مجموعة التجسس السيبراني "تيك" مرتبطة بالصين استغلت ثغرة أمان حرجة في برنامج "موTex Lanscope" لإختراق الأنظمة المؤسساتية. الثغرة، المسجلة برقم CVE-2025-61932، تتيح
@Cybercachear
31 Oct 2025
53 Impressions
0 Retweets
0 Likes
0 Bookmarks
0 Replies
0 Quotes
⚠️ Chinese hackers are exploiting a critical 9.3 CVE (CVE-2025-61932) in Motex Lanscope Endpoint Manager. It lets them run SYSTEM-level commands and plant a Gokcpdoor backdoor with new multiplexed C2 channels. Active attacks confirmed ↓ https://t.co/HTJHzYQS4x
@TheHackersNews
31 Oct 2025
9883 Impressions
30 Retweets
72 Likes
12 Bookmarks
0 Replies
0 Quotes
⚠️ Chinese hackers are exploiting a critical 9.3 CVE (CVE-2025-61932) in Motex Lanscope Endpoint Manager. It lets them run SYSTEM-level commands and plant a Gokcpdoor backdoor with new multiplexed C2 channels. Active attacks confirmed ↓ https://the... https://t.co/JXaeaEY
@IT_news_for_all
31 Oct 2025
10 Impressions
0 Retweets
0 Likes
0 Bookmarks
0 Replies
0 Quotes
In mid-2025 Sophos CTU researchers observed a campaign from the BRONZE BUTLER (also known as Tick) theat actor that exploited a zero-day vulnerability (CVE-2025-61932) in Motex LANSCOPE Endpoint Manager to steal confidential information. https://t.co/rzLSy3gZ5u https://t.co/7SxOg
@virusbtn
31 Oct 2025
3608 Impressions
11 Retweets
38 Likes
9 Bookmarks
0 Replies
1 Quote
BRONZE BUTLER exploited zero-day CVE-2025-61932 in Motex LANSCOPE Endpoint Manager to execute SYSTEM-level commands, deploy Gokcpdoor and Havoc backdoors, and exfiltrate data via cloud storage and remote tunnels. #Japan #ZeroDay #Backdoor https://t.co/IyRPvTM9xY
@TweetThreatNews
31 Oct 2025
20 Impressions
0 Retweets
0 Likes
0 Bookmarks
0 Replies
0 Quotes
統合版 JPCERT/CC | Weekly Report: LANSCOPE エンドポイントマネージャー オンプレミス版における通信チャネルの送信元検証不備の脆弱性(CVE-2025-61932)について https://t.co/izDRQ1dDm6 #itsec_jp
@itsec_jp
31 Oct 2025
2 Impressions
0 Retweets
0 Likes
0 Bookmarks
0 Replies
0 Quotes
A threat group known as BRONZE BUTLER has exploited a LANSCOPE zero-day vulnerability (CVE-2025-61932) in Japanese asset management software, raising concerns over cybersecurity in the industry. #CyberSecurity #Vulnerability https://t.co/o6vDZN8Ayk
@Cyber_O51NT
31 Oct 2025
613 Impressions
3 Retweets
5 Likes
0 Bookmarks
0 Replies
0 Quotes
My latest blog post about a campaign exploiting the LANSCOPE vulnerability (CVE-2025-61932) has been published. / BRONZE BUTLER exploits Japanese asset management software vulnerability – Sophos News https://t.co/5MRWjeEy3r
@you0708
30 Oct 2025
2974 Impressions
9 Retweets
20 Likes
4 Bookmarks
0 Replies
2 Quotes
BRONZE BUTLER Exploits Japanese Asset Management Software Vulnerability In 2025, CTU researchers identified a sophisticated BRONZE BUTLER campaign exploiting CVE-2025-61932 in Motex LANSCOPE to steal data. The Chinese state-sponsored group, active since 2010, used this zero-day
@Secwiserapp
30 Oct 2025
124 Impressions
1 Retweet
2 Likes
0 Bookmarks
0 Replies
0 Quotes
🔴 Critical LANSCOPE Endpoint Manager Flaw Exploited—CISA Confirms Active Attacks CVE-2025-61932 (CVSS 9.3) hit CISA's Known Exploited Vulnerabilities catalog after confirmed exploitation in Japan. The flaw affects Motex LANSCOPE Endpoint Manager—enterprise client managem
@the_c_protocol
28 Oct 2025
0 Impressions
0 Retweets
0 Likes
0 Bookmarks
0 Replies
0 Quotes
🚨 Lanscope Endpoint Manager [—] Oct 28, 2025 Critical security advisory for Lanscope Endpoint Manager, addressing remote code execution vulnerability CVE-2025-61932. Checkout our Threat Intelligence Platform: https://t.co/QuwNtEgYh1... https://t.co/lBeHGFMYx7
@transilienceai
28 Oct 2025
8 Impressions
0 Retweets
0 Likes
0 Bookmarks
0 Replies
0 Quotes
🚨 CVE-2025-61932 has been flagged as a critical RCE vulnerability targeting the on-prem Motex LANSCOPE Endpoint Manager. It’s actively being exploited in the wild, prompting CISA to add it to the Known Exploited Vulnerabilities catalog. Patch fast-this one’s not theoretica
@AadilAmin05
28 Oct 2025
100 Impressions
0 Retweets
0 Likes
0 Bookmarks
0 Replies
0 Quotes
⚠️ Critical CVEs Under Active Exploitation: Adobe Commerce, Lanscope, WSUS RCE Three critical vulnerabilities are actively exploited right now. CVE-2025-54236 (Adobe Commerce/Magento RCE)—attackers actively exploiting storefronts. CVE-2025-61932 (Lanscope Endpoint
@the_c_protocol
27 Oct 2025
5 Impressions
0 Retweets
0 Likes
0 Bookmarks
0 Replies
0 Quotes
🚨 LANSCOPE Endpoint Manager [—] Oct 27, 2025 Product Security Advisory Report on CVE-2025-61932 Checkout our Threat Intelligence Platform: https://t.co/QuwNtEgYh1 https://t.co/QuwNtEgYh1 #ThreatIntelligence #CyberSecurity #Innovation #LLM https://t.co/vouKWFTrkf
@transilienceai
27 Oct 2025
13 Impressions
0 Retweets
0 Likes
0 Bookmarks
0 Replies
0 Quotes
Lanscope Endpoint Manager vulnerability exploited in zero-day attacks (CVE-2025-61932) - Help Net Security https://t.co/Pp7i3G9vIE
@PVynckier
26 Oct 2025
81 Impressions
0 Retweets
3 Likes
0 Bookmarks
0 Replies
0 Quotes
⚠️ Lanscope (Motex) critical RCE CVE-2025-61932 is being exploited in the wild. If you run Lanscope Endpoint Manager: patch or isolate the console, audit remote-command logs, and block access to management ports NOW. #Lanscope #CVE2025 #InfoSec
@Wh1teCoon
26 Oct 2025
319 Impressions
0 Retweets
1 Like
1 Bookmark
0 Replies
0 Quotes
CISA has confirmed that a critical vulnerability (CVE-2025-61932) in Motex Lanscope Endpoint Manager is being actively exploited. The flaw, which has a CVSS score of 9.8, allows attackers to execute arbitrary code remotely on affected on-premises versions.
@therealbelano
25 Oct 2025
577 Impressions
5 Retweets
10 Likes
0 Bookmarks
2 Replies
0 Quotes
3/5: "CyberShield Hub's RCE radar: RedScan's AI sentinel flags packet anomalies & endpoint exploits—like CVE-2025-61932 chains—in real-time. Lightweight, local-first, no bloat. Windows solid, Linux/macOS inbound. Ever nuked a zero-day mid-manager?"
@y_cybersecurity
25 Oct 2025
69 Impressions
0 Retweets
0 Likes
0 Bookmarks
0 Replies
0 Quotes
Thread: "Motex LANSCOPE RCE (CVE-2025-61932) Goes Wild: Unauth Code Exec on Endpoint Managers—Patch or Perish!" 🚨🔒 1/5: "🚨 ENDPOINT APOCALYPSE: CISA's KEV catalog just added CVE-2025-61932—a CVSS 9.8 RCE in Motex LANSCOPE Endpoint Manager (v9.4.7.2 & earlier).
@y_cybersecurity
25 Oct 2025
56 Impressions
0 Retweets
0 Likes
0 Bookmarks
0 Replies
0 Quotes
RedScan v0.6 Unleashed: AI Defense + Ethical Hacking Bootcamp! 🚀🛡️ Oct 25, 2025, 02:58 PM WAT Cyber fam, RedScan v0.6 is live—slamming WSUS RCE (CVE-2025-59287) and LANSCOPE exploits (CVE-2025-61932) with AI, a SQLite DB, and VirusTotal ThreatFeed (500 free lookups/day)
@CybershieldHub
25 Oct 2025
80 Impressions
0 Retweets
0 Likes
1 Bookmark
0 Replies
0 Quotes
RedScan v0.6 Unleashed: AI Defense + Ethical Hacking Bootcamp! 🚀🛡️ Oct 25, 2025, 02:58 PM WAT Cyber fam, RedScan v0.6 is live—slamming WSUS RCE (CVE-2025-59287) and LANSCOPE exploits (CVE-2025-61932) with AI, a SQLite DB, and VirusTotal ThreatFeed (500 free lookups/day)
@CybershieldHub
25 Oct 2025
1 Impression
0 Retweets
0 Likes
0 Bookmarks
0 Replies
0 Quotes
Thread: "Motex LANSCOPE RCE (CVE-2025-61932) Goes Wild: Unauth Code Exec on Endpoint Managers—Patch or Perish!" 🚨🔒 1/5: "🚨 ENDPOINT APOCALYPSE: CISA's KEV catalog just added CVE-2025-61932—a CVSS 9.8 RCE in Motex LANSCOPE Endpoint Manager (v9.4.7.2 & earlier). Un
@CybershieldHub
25 Oct 2025
47 Impressions
0 Retweets
0 Likes
1 Bookmark
1 Reply
0 Quotes
🚨 Heads up, cybersecurity enthusiasts! A critical #zero-day vulnerability, CVE-2025-61932, in Lanscope Endpoint Manager, is being actively exploited in real-time attacks. Are your systems secured? 🛡️ Now's the time to double-check your defenses and patch up!
@WideWatchers
24 Oct 2025
37 Impressions
0 Retweets
0 Likes
0 Bookmarks
0 Replies
0 Quotes
CISA has added a critical vulnerability, CVE-2025-61932 (CVSS v4 score: 9.3), affecting Motex Lanscope Endpoint Manager to its KEV catalog, confirming active exploitation. https://t.co/ZcQagg7Q60
@securityRSS
24 Oct 2025
17 Impressions
0 Retweets
0 Likes
0 Bookmarks
0 Replies
0 Quotes
🛡️ Cyber Threat Digest – 2025-10-24 KEV: CVE-2025-61932 — Motex LANSCOPE Endpoint Manager NVD: CVE-2025-11429 — flaw was found in News: Mozilla: New Firefox extensions must disclose… #cybersecurity #infosec #CVE More: https://t.co/J1fpKfnDnv
@dpharristech
24 Oct 2025
0 Impressions
0 Retweets
0 Likes
0 Bookmarks
0 Replies
0 Quotes
Critical Lanscope Endpoint Manager Bug Exploited in Ongoing Cyberattacks. The vulnerability, CVE-2025-61932 (CVSS v4 score: 9.3), impacts on-premises versions of Lanscope Endpoint Manager, specifically Client program and Detection Agent. https://t.co/3SQtRszV7M https://t.co/IrZGT
@riskigy
24 Oct 2025
46 Impressions
0 Retweets
0 Likes
0 Bookmarks
0 Replies
0 Quotes
csirt_it: ‼ #Exploited #Motex: rilevato sfruttamento in rete della CVE-2025-61932 relativa al prodotto #LanscopeEndpointManager Rischio:🟠 Tipologia: 🔸 Remote Code Execution 🔗 https://t.co/q0blcfUqn4 🔄 Aggiornamenti disponibili 🔄 https://t.co/HoSCx6RJpa
@Vulcanux_
24 Oct 2025
29 Impressions
0 Retweets
0 Likes
0 Bookmarks
0 Replies
0 Quotes
🚨 CRITICAL Lanscope Endpoint Manager flaw (CVE-2025-61932) is under active attack! Remote code execution possible—patch to 9.4.7.3+ ASAP to block backdoors. CISA sets 12 Nov 2025 remediation deadline. Details: https://t.co/J3mB5STFff... https://t.co/yU9Yb9B2tO
@offseq
24 Oct 2025
99 Impressions
0 Retweets
0 Likes
0 Bookmarks
0 Replies
0 Quotes
Lanscope Endpoint Manager の脆弱性がゼロデイ攻撃で悪用される (CVE-2025-61932) Lanscope Endpoint Manager vulnerability exploited in zero-day attacks (CVE-2025-61932) #HelpNetSecurity (Oct 23) https://t.co/SQLJ3SWBeN
@foxbook
24 Oct 2025
350 Impressions
0 Retweets
3 Likes
1 Bookmark
0 Replies
0 Quotes
[
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:a:motex:lanscope_endpoint_manager:*:*:*:*:on-premise:*:*:*",
"matchCriteriaId": "F9AF3F85-064B-469C-B530-7264EF91A04F",
"versionEndExcluding": "9.3.2.7",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:motex:lanscope_endpoint_manager:*:*:*:*:on-premise:*:*:*",
"matchCriteriaId": "99DC2ADE-F5D6-45F9-B529-11C492FCDD31",
"versionEndExcluding": "9.3.3.9",
"versionStartIncluding": "9.3.3.0",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:motex:lanscope_endpoint_manager:*:*:*:*:on-premise:*:*:*",
"matchCriteriaId": "431F6B9C-8A9C-45FD-B287-E9E1D2B3ECEE",
"versionEndExcluding": "9.4.0.5",
"versionStartIncluding": "9.4.0.0",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:motex:lanscope_endpoint_manager:*:*:*:*:on-premise:*:*:*",
"matchCriteriaId": "B2398AA5-1CFD-41BA-8229-84DAC45D9382",
"versionEndExcluding": "9.4.1.5",
"versionStartIncluding": "9.4.1.0",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:motex:lanscope_endpoint_manager:*:*:*:*:on-premise:*:*:*",
"matchCriteriaId": "0429C621-5DDE-4773-99D3-A20DC0C4798F",
"versionEndExcluding": "9.4.2.6",
"versionStartIncluding": "9.4.2.0",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:motex:lanscope_endpoint_manager:*:*:*:*:on-premise:*:*:*",
"matchCriteriaId": "034F13F1-D926-4298-BCC9-DF424591CBF1",
"versionEndExcluding": "9.4.3.8",
"versionStartIncluding": "9.4.3.0",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:motex:lanscope_endpoint_manager:*:*:*:*:on-premise:*:*:*",
"matchCriteriaId": "66C87047-9DE9-4CE8-80A9-AEBEB58B8402",
"versionEndExcluding": "9.4.4.6",
"versionStartIncluding": "9.4.4.0",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:motex:lanscope_endpoint_manager:*:*:*:*:on-premise:*:*:*",
"matchCriteriaId": "8FF0B7EE-805A-431D-96E5-BF5BDDD3178E",
"versionEndExcluding": "9.4.5.4",
"versionStartIncluding": "9.4.5.0",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:motex:lanscope_endpoint_manager:*:*:*:*:on-premise:*:*:*",
"matchCriteriaId": "21520838-C0C4-4F66-B5C6-1B6231225FF1",
"versionEndExcluding": "9.4.6.3",
"versionStartIncluding": "9.4.6.0",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:motex:lanscope_endpoint_manager:*:*:*:*:on-premise:*:*:*",
"matchCriteriaId": "C669A3EF-3A71-46C0-B1FB-455CBB78B887",
"versionEndIncluding": "9.4.7.1",
"versionStartIncluding": "9.4.7.0",
"vulnerable": true
}
],
"negate": false,
"operator": "OR"
}
]
}
]