• Hello and welcome! Register to enjoy full access and benefits:

    • Advertise in the Marketplace section for free.
    • Get more visibility with a signature link.
    • Company/website listings.
    • Ask & answer queries.
    • Much more...

    Register here or log in if you're already a member.

  • 🎉 WHV has crossed 35,000 monthly views (unique) and 208,000 clicks per month, as per Google Analytics! Thank you for your support! 🎉

CISA Warns: Hackers Exploit Lanscope Endpoint Manager Security Flaw

johny899

New Member
Content Writer
Messages
655
Reaction score
3
Points
23
Balance
$805.6USD
Hello! If you use Lanscope Endpoint Manager, you’ll want to pay attention to this. The Cybersecurity and Infrastructure Security Agency (CISA) has just provided an alert on a severe vulnerability in the software-and there are hackers actively exploiting the vulnerability.

So, what’s the vulnerability?​

The vulnerability is called CVE-2025-61932, and it’s a critical flaw (9.3/10). Basically, the vulnerability allows an attacker to execute their code on your system, simply by sending the system crafted data packets. An attacker does not need to authenticate!

Affected versions:

• All Lanscope Endpoint Manager versions 9.4.7.2 and below are vulnerable;
• A patch is available in the released version (9.4.7.3) -- there is no other alternate mitigation measure!

So, the only real option? Update your devices right away.

Who should be concerned?​

If you manage computers, mobile devices or servers using Lanscope, this will apply to you.

The CISA has added this vulnerability to their Known Exploited Vulnerabilities (KEV) list which means that hackers are already exploiting it on systems.

Government agencies are encouraged to fix this by November 12. Even if you are not a government agency, it is wise to fix this as soon as possible.

What actions should you take, and what is first?​

These are some things that you can do immediately:

• Update Lanscope Endpoint Manager to the latest version (9.4.7.2 or higher)
• Reject / limit network access to your Lanscope servers until a patch can be applied.
• Review your logs for any unusual or suspicious activity.
• Notify your IT department so they can take immediate action and to communicate to others that it is urgent.

These simple steps can help prevent attackers before they gain entry to your network.

Importance of this issue​

I’ve encountered scenarios like this before — they begin insignificant but can escalate into significant security risks. The red flag raised by CISA is a clear sign that we are not just making it up, but attackers are taking actions against organizations.