Comprehensive Threat Exposure Management Platform
A critical remote code execution (RCE) vulnerability, tracked as CVE-2025-61932, has been discovered in Motex Lanscope Endpoint Manager (on-premises), specifically affecting the Client (MR) and Detection Agent (DA) components. The vulnerability allows unauthenticated remote attackers to execute arbitrary code on vulnerable endpoints by sending specially crafted packets, primarily over TCP port 443.
The flaw has been actively exploited since April 2025, with attackers using malicious payloads to drop backdoors, enabling persistent remote access and control of affected systems. Versions up to 9.4.7.1 are vulnerable, while patched releases have been made available by Motex. The cloud version and the management server are not affected.
Given Lanscope’s widespread use across Japanese enterprises and Asian markets, this vulnerability poses a high operational risk to corporate networks and endpoint fleets.
CVE-2025-61932 stems from improper verification of communication source authenticity in the Lanscope Endpoint Manager. Attackers can exploit this flaw remotely—without authentication—to deliver maliciously crafted communication requests that lead to arbitrary code execution.
Successful exploitation enables attackers to fully compromise vulnerable endpoints, execute arbitrary code, install backdoors, and maintain persistence within enterprise environments.
IPv4 Addresses Observed in Exploitation Campaigns:
38[.]54[.]88[.]172
| Tactic | Technique | Technique ID |
|---|---|---|
| Initial Access | Exploit Public-Facing Application | T1190 |
| Execution | Exploitation for Client Execution | T1203 |
| Persistence | Exploitation of Remote Services | T1210 |
| Command & Control | Application Layer Protocol – Web Protocols | T1071.001 |
| Defense Evasion | Command and Scripting Interpreter | T1059 |
| Privilege Escalation | Exploitation for Privilege Escalation | T1068 |
| Resource Development | Obtain Capabilities – Vulnerabilities, Exploits | T1588, T1588.005, T1588.006 |
Get through updates and upcoming events, and more directly in your inbox