Critical (9.8)

Software Path Traversal Flaw (CVE-2026-25785) - Patch Now

CVE-2026-25785

Path traversal vulnerability exists in Lanscope Endpoint Manager (On-Premises) Sub-Manager Server Ver.9.4.7.3 and earlier, which may allow an attacker to tamper with arbitrary files and execute arbitr...

Overview

A critical security flaw has been identified in Lanscope Endpoint Manager (On-Premises) Sub-Manager Server. This vulnerability could allow an attacker to take full control of the affected server.

Vulnerability Explanation

In simple terms, this is a path traversal vulnerability. The software does not properly validate user input when accessing files. An attacker can exploit this by crafting a special request that “escapes” the intended directory and navigates to other sensitive locations on the server’s file system. This allows them to read, modify, or delete critical files they should not have access to.

Impact

The severity of this vulnerability is rated as CRITICAL (CVSS Score: 9.8). Successful exploitation can lead to:

  • Arbitrary File Tampering: Attackers can overwrite or delete system or application files, leading to service disruption or permanent data loss.
  • Arbitrary Code Execution: By uploading or modifying specific files, an attacker can run malicious code with the same privileges as the Lanscope service. This typically results in a complete compromise of the server.
  • Full System Control: Once an attacker can execute code, they can install malware, steal sensitive data, use the server to attack other internal systems, or create a persistent backdoor.

Affected Versions

This vulnerability affects Lanscope Endpoint Manager (On-Premises) Sub-Manager Server versions 9.4.7.3 and all earlier releases.

Remediation and Mitigation

Immediate action is required to protect your systems.

Primary Action - Patching: Apply the official security update provided by Lanscope as soon as possible. Contact Lanscope support or check their official security bulletin for the patch targeting CVE-2026-25785. Update all affected Sub-Manager Servers to a fixed version.

Interim Mitigations (If Patching is Delayed):

  1. Network Segmentation: Restrict network access to the Sub-Manager Server’s administrative interface. Ensure it is not directly accessible from the internet and is only reachable by authorized management networks.
  2. Review Access Logs: Monitor the server’s access and web application logs for suspicious activity, such as requests containing numerous ../ sequences or attempts to access known system file paths.
  3. Principle of Least Privilege: Verify that the operating system account running the Lanscope service has only the minimum permissions necessary for it to function, limiting the impact of potential code execution.

General Recommendation: Treat any system running an affected version as potentially compromised. Investigate for signs of unauthorized access or unusual activity, especially if the server was exposed to untrusted networks.

Share:

Never miss a critical vulnerability

Get real-time security alerts delivered to your preferred platform.

Related Advisories

Never Miss a Critical Alert

CVE advisories, breach reports, and threat intel — delivered daily to your inbox.