CVE-2025-61932

LANSCOPE Endpoint Manager — Unauthenticated Remote Code Execution via Spoofed Communication Channel, Exploited by Chinese APT Bronze Butler
🔥 CVSS 3.1  9.8 / 10 — CRITICAL 🔴 CISA Known Exploited Vulnerability

What is LANSCOPE Endpoint Manager?

LANSCOPE Endpoint Manager is an enterprise endpoint management and security platform developed by MOTEX Inc., a Japanese security software vendor headquartered in Tokyo. The product is the flagship offering in the LANSCOPE product family and is widely deployed across Japanese enterprises, particularly in the financial services, manufacturing, and government sectors.

LANSCOPE Endpoint Manager provides:

  • IT asset management — centralized discovery, inventory, and lifecycle tracking of Windows PCs, Macs, smartphones, and tablets across the organization
  • Operation log collection — records detailed logs of user activity on managed endpoints (file access, application usage, web browsing, device connections), used for insider threat detection and compliance auditing
  • Data loss prevention (DLP) — monitors and controls data movement to detect and prevent unauthorized exfiltration of sensitive information
  • Mobile Device Management (MDM) — enrollment and policy enforcement for iOS and Android devices
  • Security policy enforcement — enforces endpoint configuration standards, manages antivirus, and controls USB and peripheral device usage

The on-premises version of LANSCOPE Endpoint Manager uses a client-server architecture where a management server communicates with lightweight client agents (called the Client Program / MR) and detection agents (DA) installed on managed endpoints. This agent communication is the attack surface for CVE-2025-61932.

LANSCOPE Endpoint Manager's dominant market position in Japan — particularly among organizations that handle sensitive data and require detailed audit logging — makes it a high-value target for state-sponsored espionage actors seeking access to networks containing intellectual property, government communications, or sensitive business data.

Overview

LANSCOPE Endpoint Manager (on-premises) contains an improper verification of source of a communication channel vulnerability (CWE-940) in the client program (MR) and detection agent (DA) components. An unauthenticated remote attacker can send specially crafted packets to TCP port 443 on a system running the affected client software, causing the endpoint to accept the packets as if they originated from a legitimate LANSCOPE management server, and subsequently execute arbitrary code on the vulnerable system.

CVE-2025-61932 was exploited as a zero-day by the Chinese state-sponsored threat group Bronze Butler (also known as Tick or REDBALDKNIGHT) for approximately six months before MOTEX disclosed the vulnerability. CISA added it to the KEV catalog on October 22, 2025 — the same day JPCERT/CC made the public disclosure — making this one of the fastest KEV additions from disclosure date, reflecting the confirmed and ongoing in-the-wild exploitation at the time of patching.

Affected Versions

Component Vulnerable Versions Fixed Version
Client Program (MR) — On-Premises 9.4.7.1 and earlier See fixed builds below
Detection Agent (DA) — On-Premises 9.4.7.1 and earlier See fixed builds below

Fixed versions (patch to the appropriate build for your release branch):

Branch Fixed Build
9.4.7.x 9.4.7.3
9.4.6.x 9.4.6.3
9.4.5.x 9.4.5.4
9.4.4.x 9.4.4.6
9.4.3.x 9.4.3.8
9.4.2.x 9.4.2.6
9.4.1.x 9.4.1.5
9.4.0.x 9.4.0.5
9.3.3.x 9.3.3.9
9.3.2.x 9.3.2.7

Note: The management server component is not affected by this vulnerability and does not require an update. Only the client-side agent components (MR and DA) installed on managed endpoints need to be patched.

Technical Details

CVE-2025-61932 is classified as CWE-940 (Improper Verification of Source of a Communication Channel). The vulnerability exists in the agent communication protocol used by LANSCOPE Endpoint Manager's client program and detection agent components.

The core flaw: The affected client components listen on TCP port 443 for instructions from the LANSCOPE management server. The protocol fails to adequately verify that incoming packets genuinely originate from a legitimate, authorized management server. An attacker on a network path to the endpoint can craft and send packets that impersonate the management server, causing the agent to accept and act on the malicious instructions — including executing arbitrary code.

Attack characteristics:

  • No authentication required — the flaw is in source verification, not authentication bypass
  • Attack is delivered via specially crafted packets to TCP port 443
  • The agent components on managed endpoints are the vulnerable surface, not the central management server
  • Exploitation allows arbitrary code execution on the managed endpoint (the victim workstation or server), not the central server
  • Network-accessible from any host able to reach the target endpoint on TCP port 443

CWE-940 (Improper Verification of Source of a Communication Channel): The product establishes a communication channel to handle incoming requests but does not sufficiently verify that the source of those communications is the expected, legitimate party. This allows an attacker to impersonate the trusted communication source and inject malicious commands.

Gokcpdoor malware: In the confirmed Bronze Butler exploitation campaign, attackers delivered the Gokcpdoor backdoor payload following successful exploitation. The 2025 variant of Gokcpdoor represents an evolution from earlier versions used by Bronze Butler — it dropped support for the KCP transport protocol and instead implemented advanced multiplexing communication capabilities using third-party libraries for command-and-control, making network-level detection more difficult.

Discovery

Sophos conducted the primary threat research that attributed the exploitation campaign to Bronze Butler (Tick), published on October 30, 2025. Sophos documented the attack chain, the Gokcpdoor malware payload, and the targeting pattern focused on Japanese organizations. JPCERT/CC (Japan's national CERT) coordinated the public disclosure on October 22, 2025, in conjunction with MOTEX's advisory. The vulnerability was disclosed to MOTEX through responsible disclosure processes, though the precise timeline of when MOTEX first learned of the active exploitation is not publicly documented.

Exploitation Context

CVE-2025-61932 has a confirmed zero-day exploitation window beginning approximately April 2025 — roughly six months before public disclosure in October 2025. During this period, the Chinese state-sponsored APT group Bronze Butler (also tracked as Tick and REDBALDKNIGHT) exploited the vulnerability in targeted cyber-espionage campaigns against Japanese organizations.

Threat actor profile — Bronze Butler (Tick):

  • Active since at least 2010; consistently targets Japan
  • Previously exploited a zero-day in SKYSEA Client View (a competing Japanese IT asset management product) in 2016 — demonstrating a pattern of targeting Japan-specific enterprise software
  • Assessed as a Chinese government-affiliated group focused on intellectual property theft and strategic intelligence collection
  • Primary targets include Japanese defense contractors, manufacturing, technology, and critical infrastructure sectors

Campaign characteristics:

  • Attacks were highly targeted — focused on organizations using LANSCOPE Endpoint Manager in Japan
  • Bronze Butler used the CVE-2025-61932 foothold to deploy the Gokcpdoor backdoor for persistent remote access
  • The campaign involved theft of confidential data from compromised endpoints
  • The six-month zero-day window gave attackers extended undetected access to victim environments before the patch was available

The product's concentration among Japanese enterprises — and the LANSCOPE agent's privileged position on managed endpoints with access to operation logs, file access records, and sensitive business data — made it a strategically valuable exploitation target for an APT focused on intelligence collection.

Remediation

  1. Update all client program (MR) and detection agent (DA) instances immediately — apply the fixed build for your release branch (see Affected Versions table above); the management server does not require an update
  2. Prioritize endpoints holding sensitive data — given the espionage-focused nature of confirmed exploitation, endpoints accessing sensitive intellectual property, communications, or regulated data should be patched first
  3. Assume compromise for unpatched instances — given the approximately six-month zero-day exploitation window, treat any LANSCOPE Endpoint Manager client that was network-accessible during April–October 2025 as potentially compromised
  4. Hunt for Gokcpdoor indicators — review endpoints for indicators of compromise associated with the Gokcpdoor backdoor; consult Sophos's published threat research for specific indicators of compromise (IOCs), file hashes, and network signatures
  5. Audit network connections from managed endpoints — review firewall and endpoint logs for unusual outbound connections, particularly to unexpected external IPs on non-standard ports, which may indicate active C2 communication
  6. Restrict network access to the agent listener — while the agent must communicate with the management server, firewall rules should limit which hosts can reach TCP port 443 on managed endpoints; block access from internet-facing or untrusted network segments where possible
  7. Review operation logs from LANSCOPE — LANSCOPE's own logging capabilities may contain evidence of suspicious activity on compromised endpoints during the exploitation window; preserve these logs before remediation
  8. Coordinate with JPCERT/CC or a national CERT if you are a Japanese organization and suspect compromise — JPCERT/CC was involved in the coordinated disclosure and may have additional threat intelligence relevant to the campaign

Key Details

PropertyValue
CVE ID CVE-2025-61932
Vendor / Product Motex — LANSCOPE Endpoint Manager
NVD Published2025-10-20
NVD Last Modified2025-10-23
CVSS 3.1 Score9.8
CVSS 3.1 VectorCVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H
SeverityCRITICAL
CWE CWE-940
CISA KEV Added2025-10-22
CISA KEV Deadline2025-11-12
Known Ransomware Use No

CVSS 3.1 Breakdown

Attack Vector
Network
Attack Complexity
Low
Privileges Required
None
User Interaction
None
Scope
Unchanged
Confidentiality
High
Integrity
High
Availability
High

Required Action

CISA BOD 22-01 Deadline: 2025-11-12. Apply mitigations per vendor instructions, follow applicable BOD 22-01 guidance for cloud services, or discontinue use of the product if mitigations are unavailable.

Timeline

DateEvent
2025-04-01Bronze Butler (Tick) begins exploiting CVE-2025-61932 as a zero-day against Japanese organizations — approximately six months before public disclosure
2025-10-20MOTEX publishes security advisory disclosing the vulnerability and releasing patched versions of LANSCOPE Endpoint Manager
2025-10-20CVE-2025-61932 published
2025-10-22JPCERT/CC publicly discloses the vulnerability
2025-10-22CISA adds CVE-2025-61932 to the Known Exploited Vulnerabilities catalog on the same day as JPCERT/CC disclosure — confirming active zero-day exploitation
2025-10-30Sophos publishes detailed threat research attributing exploitation to Chinese APT Bronze Butler (Tick) and documenting the Gokcpdoor malware payload
2025-11-12CISA BOD 22-01 remediation deadline