Kyocera Communications subsidiary Motex this week released urgent patches for a critical-severity vulnerability in Lanscope Endpoint Manager that has been exploited in the wild as a zero-day.
Tracked as CVE-2025-61932 (CVSS score of 9.8), the bug is described as “an improper verification of source of a communication channel” issue, which allows remote attackers to send crafted packets and achieve arbitrary code execution.
In its advisory, Japan-based Motex warned that, in a customer environment, “unauthorized packets were received from outside”, hinting at an exploitation attempt.
There does not appear to be any public information on the attacks exploiting CVE-2025-61932, but Japan’s JPCERT/CC said it’s aware of possible attacks against domestic organizations. This is not surprising considering that the Lanscope endpoint management product is primarily used in Asia, particularly in Japan.
The flaw affects on-premises Lanscope Endpoint Manager versions 9.4.7.1 and earlier, and was resolved with the release of versions 9.3.2.7, 9.3.3.9, 9.4.0.5, 9.4.1.5, 9.4.2.6, 9.4.3.8, 9.4.4.6, 9.4.5.4, 9.4.6.3, and 9.4.7.3.
All client systems should be updated to a patch version, but the manager’s version upgrade is not necessary, Motex said.
On Wednesday, the US cybersecurity agency CISA added CVE-2025-61932 to its Known Exploited Vulnerabilities (KEV) list, warning of its in-the-wild abuse.
As mandated by the Binding Operational Directive (BOD) 22-01, federal agencies should identify vulnerable Lanscope Endpoint Manager deployments in their environments and patch them within three weeks (by November 12).
“This type of vulnerability is a frequent attack vector for malicious cyber actors and poses significant risks to the federal enterprise,” CISA warned.
BOD 22-01 only applies to federal agencies, but all organizations are advised to review CISA’s KEV list and apply patches and mitigations for the vulnerabilities it describes.
Related: CISA Warns of Exploited Apple, Kentico, Microsoft Vulnerabilities
Related: CISA Confirms Exploitation of Latest Oracle EBS Vulnerability
Related: Organizations Warned of Exploited Adobe AEM Forms Vulnerability
Related: Microsoft Patches 173 Vulnerabilities, Including Exploited Windows Flaws

