The U.S. Cybersecurity and Infrastructure Security Agency (CISA) has issued a directive for federal agencies to patch a critical, actively exploited vulnerability in Motex's LANSCOPE Endpoint Manager. The vulnerability, tracked as CVE-2025-61932, has been added to CISA's Known Exploited Vulnerabilities (KEV) catalog due to evidence of in-the-wild attacks. The flaw, with a CVSS v4 score of 9.3, allows an unauthenticated, remote attacker to execute arbitrary code on systems running the LANSCOPE agent. Reports from Japan's JPCERT/CC and Motex confirm that attackers are targeting the flaw to deploy backdoors, prompting CISA to set a remediation deadline of November 12, 2025, for federal agencies.
The vulnerability exists in the on-premises versions of LANSCOPE Endpoint Manager, specifically affecting the Client Program (MR) and Detection Agent (DA) components. It is described as an 'improper verification of source of a communication channel.' This allows a remote attacker on the same network segment to send specially crafted network packets to a listening port on an endpoint with the LANSCOPE agent installed. Successful exploitation results in the execution of arbitrary code with the privileges of the agent, which are typically elevated.
The vulnerability affects the following on-premises products:
Motex has released several patched versions to address the issue, and customers are urged to upgrade.
Active exploitation has been confirmed, primarily in Japan. Japan's JPCERT/CC and the JVN portal reported that malicious packets targeting the vulnerability were observed in domestic customer environments starting after April 2025. Motex also confirmed at least one customer received a malicious packet suspected of exploiting this flaw. The goal of the observed attacks is to install an unspecified backdoor on the compromised endpoint, providing the attacker with persistent remote access (T1505.003 - Web Shell). The addition to the CISA KEV catalog on October 22, 2025, underscores the seriousness and ongoing nature of the threat.
Compromising an endpoint management solution like LANSCOPE provides a powerful foothold within a network.
| Type | Value | Description |
|---|---|---|
| network_traffic_pattern | Inbound traffic to LANSCOPE agent ports | Monitor for unexpected or malformed packets sent to the ports used by the LANSCOPE MR and DA agents from unusual source IPs on the LAN. |
| process_name | LANSCOPE agent process (dtagent.exe, etc.) |
Monitor the agent process for suspicious child processes (e.g., powershell.exe, cmd.exe) or anomalous network activity. |
| file_name | Unrecognized executables in temp directories | Look for newly created executable or script files dropped by the exploit, which would constitute the backdoor. |
D3-NTA: Network Traffic Analysis to spot the malicious packets and D3-PA: Process Analysis to detect anomalous agent behavior.D3-SU: Software Update.D3-ITF: Inbound Traffic Filtering on host-based firewalls can help restrict communication to the vulnerable agent ports.China-linked 'Bronze Butler' APT identified exploiting CVE-2025-61932 as a zero-day since mid-2025, deploying 'Gokcpdoor' backdoor for espionage.
New intelligence attributes the active exploitation of CVE-2025-61932 to the China-linked 'Bronze Butler' (Tick) APT group. Researchers confirm the group exploited this vulnerability as a zero-day, initiating attacks in mid-2025, months before a patch was available. The APT deployed an updated 'Gokcpdoor' backdoor for data theft and remote control, utilizing tools like 'goddi' for credential dumping and 7-Zip for archiving. This attribution to a sophisticated nation-state actor significantly elevates the threat level and highlights the advanced nature of the ongoing campaign.

Cybersecurity professional with over 10 years of specialized experience in security operations, threat intelligence, incident response, and security automation. Expertise spans SOAR/XSOAR orchestration, threat intelligence platforms, SIEM/UEBA analytics, and building cyber fusion centers. Background includes technical enablement, solution architecture for enterprise and government clients, and implementing security automation workflows across IR, TIP, and SOC use cases.
Help others stay informed about cybersecurity threats