- CISA provides important Motex Lanscope flaw to its Recognized Exploited Vulnerabilities catalog
- The CVE-2025-61932 bug permits distant code execution and was exploited as a zero-day
- Businesses should patch inside three weeks; personal corporations are strongly urged to comply with go well with
The US Cybersecurity and Infrastructure Safety Company (CISA) has added a important severity Motex Landscope Endpoint Supervisor flaw to its Recognized Exploited Vulnerabilities (KEV) catalog, signaling abuse within the wild, and urging authorities companies to use the patch instantly.
Just lately, Motex mentioned it mounted an improper verification of the origin of incoming requests vulnerability, which may very well be abused to attain arbitrary code execution. It’s tracked as CVE-2025-61932, and was given a severity rating of 9.3/10 (important).
“A vulnerability exists within the Endpoint Supervisor On-Premises shopper program (hereafter known as MR) and the Detection Agent (hereafter known as DA) that enables distant code execution,” the corporate mentioned in a safety advisory.
Zero-day
On the time the patch was launched, the vulnerability was already being exploited as a zero-day, Motex confirmed. Variations 9.4.7.2 and earlier have been mentioned to be weak, and the corporate confirmed there have been no workarounds accessible.
On October 22, CISA added the flaw to KEV, giving Federal Civilian Govt Department (FCEB) companies a three-week deadline to patch up or cease utilizing this system altogether. Whereas CISA’s directive is simply necessary for FCEB companies, organizations within the personal sector would do properly to comply with go well with and patch up, since cybercriminals not often make the excellence between the 2.
Lanscope Endpoint Supervisor is an endpoint administration and safety resolution developed by Motex, a subsidiary of Kyocera Communication Techniques.
It’s a centralized resolution with options similar to asset administration, operation log acquisition, and completely different safety measures, and is obtainable as an asset/endpoint administration possibility by way of Amazon Net Providers (AWS), and is sort of common in Japan and Asia.
Signal as much as the TechRadar Professional publication to get all the highest information, opinion, options and steerage what you are promoting must succeed!
Whereas Motex confirmed abuse within the wild, it didn’t title any victims, or attackers.
Nonetheless BleepingComputer speculates the current assaults on Asahi brewery and the Askul ecommerce retailer might have been carried out by way of the Motex flaw. In that case, one of many ransomware teams abusing the bug is Qilin.
Follow TechRadar on Google News andadd us as a preferred source to get our knowledgeable information, critiques, and opinion in your feeds. Be certain to click on the Observe button!
And naturally you may as well follow TechRadar on TikTok for information, critiques, unboxings in video type, and get common updates from us on WhatsApp too.

➡️ Read our full guide to the best antivirus
1. Finest general:
Bitdefender Complete Safety
2. Finest for households:
Norton 360 with LifeLock
3. Finest for cellular:
McAfee Cellular Safety