jvndb-2026-000026
Vulnerability from jvndb
Published
2026-02-25 15:14
Modified
2026-02-25 15:14
Severity ?
Summary
Lanscope Endpoint Manager (On-Premises) vulnerable to path traversal
Details
Lanscope Endpoint Manager (On-Premises) provided by MOTEX Inc. contains the following vulnerability.<a href='https://cwe.mitre.org/data/definitions/22.html' target='_blank'></a><ul><li>Path traversal (CWE-22) - CVE-2026-25785</li></ul>The following people reported this vulnerability to MOTEX Inc. and coordinated with the vendor. After the coordination was completed, MOTEX Inc. reported the case to IPA in order to notify users of the solution through JVN.
Reporter: Kazuki Furukawa, Yuma Taki, Kota Takeda, Ippei Kakurai, Masaaki Chida, Denis Faiustov of GMO Cybersecurity by Ierae, Inc.
References
| Type | URL | |
|---|---|---|
Impacted products
| Vendor | Product | |
|---|---|---|
{
"@rdf:about": "https://jvndb.jvn.jp/en/contents/2026/JVNDB-2026-000026.html",
"dc:date": "2026-02-25T15:14+09:00",
"dcterms:issued": "2026-02-25T15:14+09:00",
"dcterms:modified": "2026-02-25T15:14+09:00",
"description": "Lanscope Endpoint Manager (On-Premises) provided by MOTEX Inc. contains the following vulnerability.\u003ca href=\u0027https://cwe.mitre.org/data/definitions/22.html\u0027 target=\u0027_blank\u0027\u003e\u003c/a\u003e\u003cul\u003e\u003cli\u003ePath traversal (CWE-22) - CVE-2026-25785\u003c/li\u003e\u003c/ul\u003eThe following people reported this vulnerability to MOTEX Inc. and coordinated with the vendor. After the coordination was completed, MOTEX Inc. reported the case to IPA in order to notify users of the solution through JVN.\r\nReporter: Kazuki Furukawa, Yuma Taki, Kota Takeda, Ippei Kakurai, Masaaki Chida, Denis Faiustov of GMO Cybersecurity by Ierae, Inc.",
"link": "https://jvndb.jvn.jp/en/contents/2026/JVNDB-2026-000026.html",
"sec:cpe": {
"#text": "cpe:/a:motex:lanscope_endpoint_manager_on-premises_edition",
"@product": "LANSCOPE Endpoint Manager On-Premises Edition",
"@vendor": "MOTEX Inc.",
"@version": "2.2"
},
"sec:cvss": {
"@score": "9.8",
"@severity": "Critical",
"@type": "Base",
"@vector": "CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H",
"@version": "3.0"
},
"sec:identifier": "JVNDB-2026-000026",
"sec:references": [
{
"#text": "https://jvn.jp/en/jp/JVN79096585/index.html",
"@id": "JVN#79096585",
"@source": "JVN"
},
{
"#text": "https://www.cve.org/CVERecord?id=CVE-2026-25785",
"@id": "CVE-2026-25785",
"@source": "CVE"
},
{
"#text": "https://www.ipa.go.jp/en/security/vulnerabilities/cwe.html",
"@id": "CWE-22",
"@title": "Path Traversal(CWE-22)"
}
],
"title": "Lanscope Endpoint Manager (On-Premises) vulnerable to path traversal"
}
Loading…
Loading…
Sightings
| Author | Source | Type | Date |
|---|
Nomenclature
- Seen: The vulnerability was mentioned, discussed, or seen somewhere by the user.
- Confirmed: The vulnerability is confirmed from an analyst perspective.
- Published Proof of Concept: A public proof of concept is available for this vulnerability.
- Exploited: This vulnerability was exploited and seen by the user reporting the sighting.
- Patched: This vulnerability was successfully patched by the user reporting the sighting.
- Not exploited: This vulnerability was not exploited or seen by the user reporting the sighting.
- Not confirmed: The user expresses doubt about the veracity of the vulnerability.
- Not patched: This vulnerability was not successfully patched by the user reporting the sighting.
Loading…
Loading…