Skip to content
  • Home
  • Cyber Map
  • About Us – Contact
  • Disclaimer
  • Terms and Rules
  • Privacy Policy
Cyber Web Spider Blog – News

Cyber Web Spider Blog – News

Globe Threat Map provides a real-time, interactive 3D visualization of global cyber threats. Monitor DDoS attacks, malware, and hacking attempts with geo-located arcs on a rotating globe. Stay informed with live logs and archive stats.

  • Home
  • Cyber Map
  • Cyber Security News
  • Security Week News
  • The Hacker News
  • How To?
  • Toggle search form
Amazon WorkSpaces For Linux Vulnerability Let Attackers extract valid authentication token

Amazon WorkSpaces For Linux Vulnerability Let Attackers extract valid authentication token

Posted on November 7, 2025November 7, 2025 By CWS

Amazon has disclosed a major safety vulnerability in its WorkSpaces consumer for Linux that would permit unauthorized customers to extract legitimate authentication tokens and acquire unauthorized entry to different customers’ WorkSpaces.

The vulnerability, tracked as CVE-2025-12779, impacts a number of consumer variations and poses a direct risk to organizations counting on Amazon’s desktop-as-a-service platform for distant work infrastructure.

The improper dealing with of authentication tokens within the Amazon WorkSpaces consumer for Linux variations 2023.0 by 2024.8 creates a window of alternative for attackers with native machine entry.

Improper Token Dealing with Creates Safety Threat

Underneath particular circumstances, an unintended consumer on the identical consumer machine can extract legitimate DCV-based Workspace authentication tokens.

This vulnerability bypasses the authentication layer that separates particular person Workspace periods, probably exposing delicate enterprise information and confidential consumer info to lateral motion assaults.

The token extraction vulnerability represents a important oversight in credential safety mechanisms.

Whereas WorkSpaces employs a number of safety layers for cloud entry, the client-side token dealing with failed to keep up correct isolation between native customers.

Which means any consumer with command-line entry or system-level permissions on a shared consumer machine may retrieve the authentication credentials of different customers working on the identical {hardware}.

The vulnerability targets explicitly organizations using DCV-based WorkSpaces with the affected Linux consumer variations.

AttributeDetailsCVE IDCVE-2025-12779ComponentAmazon WorkSpaces Consumer for LinuxVulnerability TypeImproper Authentication Token HandlingAffected Versions2023.0 by 2024.8

This encompasses enterprises which have deployed WorkSpaces throughout Linux-based infrastructure or hybrid environments the place Linux purchasers are major entry factors.

The publicity window covers roughly two years of consumer releases, affecting a considerable consumer base that will not have actively up to date their installations.

Scope and Impression Evaluation

Amazon has proactively engaged with prospects affected by this vulnerability, notifying them of the end-of-support timeline for impacted variations.

This communication technique demonstrates AWS’s dedication to addressing the safety hole. Nevertheless, organizations with legacy consumer deployments could face challenges in fast remediation throughout their consumer base.

Amazon resolved CVE-2025-12779 within the Amazon WorkSpaces consumer for Linux model 2025.0 and later releases. Organizations working any model between 2023.0 and 2024.8 ought to prioritize upgrading instantly.

The up to date consumer is obtainable by the Amazon WorkSpaces Consumer Obtain web page, the place IT groups can retrieve the most recent model for enterprise deployment.

Safety groups ought to conduct fast stock assessments to determine all Linux WorkSpaces purchasers presently deployed of their setting.

Organizations with a number of consumer installations throughout distributed groups ought to develop a phased improve technique to attenuate disruption whereas guaranteeing well timed remediation.

This vulnerability underscores the significance of retaining software program updated and establishing common patch administration cycles for distant entry infrastructure.

Observe us on Google Information, LinkedIn, and X for every day cybersecurity updates. Contact us to function your tales.

Cyber Security News Tags:Amazon, Attackers, Authentication, Extract, Linux, Token, Valid, Vulnerability, WorkSpaces

Post navigation

Previous Post: FreeBSD-based OPNsense firewall Released for Security Issues and Improvements
Next Post: 18 Arrested in Crackdown on Credit Card Fraud Rings

Related Posts

Anthropic Challenges U.S. ‘Supply Chain Risk’ Designation Anthropic Challenges U.S. ‘Supply Chain Risk’ Designation Cyber Security News
131 Malicious Extensions Targeting WhatsApp Used Found in Chrome Web Store 131 Malicious Extensions Targeting WhatsApp Used Found in Chrome Web Store Cyber Security News
Phishing Scam Targets Booking.com Users in Fraud Scheme Phishing Scam Targets Booking.com Users in Fraud Scheme Cyber Security News
Microsoft Warns of Hackers Abuse Teams Features and Capabilities to Deliver Malware Microsoft Warns of Hackers Abuse Teams Features and Capabilities to Deliver Malware Cyber Security News
CISA Warns Of Adobe Experience Manager Forms 0-Day Vulnerability Exploited In Attacks CISA Warns Of Adobe Experience Manager Forms 0-Day Vulnerability Exploited In Attacks Cyber Security News
CISA Added WinRaR Zero-Day (CVE-2025-8088) Vulnerability That is Actively Exploited In the Wild CISA Added WinRaR Zero-Day (CVE-2025-8088) Vulnerability That is Actively Exploited In the Wild Cyber Security News

Categories

  • Cyber Security News
  • How To?
  • Security Week News
  • The Hacker News

Recent Posts

  • FBI Verifies Email Breach as US Offers Reward for Hackers
  • Critical F5 BIG-IP Vulnerability Now Actively Exploited
  • China-Linked Cyber Threats Target Southeast Asian Government
  • AI-Powered VoidLink Malware Framework Poses New Cyber Threat
  • Top Log Monitoring Tools to Watch in 2026

Pages

  • About Us – Contact
  • Disclaimer
  • Privacy Policy
  • Terms and Rules

Archives

  • March 2026
  • February 2026
  • January 2026
  • December 2025
  • November 2025
  • October 2025
  • September 2025
  • August 2025
  • July 2025
  • June 2025
  • May 2025

Recent Posts

  • FBI Verifies Email Breach as US Offers Reward for Hackers
  • Critical F5 BIG-IP Vulnerability Now Actively Exploited
  • China-Linked Cyber Threats Target Southeast Asian Government
  • AI-Powered VoidLink Malware Framework Poses New Cyber Threat
  • Top Log Monitoring Tools to Watch in 2026

Pages

  • About Us – Contact
  • Disclaimer
  • Privacy Policy
  • Terms and Rules

Categories

  • Cyber Security News
  • How To?
  • Security Week News
  • The Hacker News

Copyright © 2026 Cyber Web Spider Blog – News.

Powered by PressBook Masonry Dark