Skip to content
  • Blog Home
  • Cyber Map
  • About Us – Contact
  • Disclaimer
  • Terms and Rules
  • Privacy Policy
Cyber Web Spider Blog – News

Cyber Web Spider Blog – News

Globe Threat Map provides a real-time, interactive 3D visualization of global cyber threats. Monitor DDoS attacks, malware, and hacking attempts with geo-located arcs on a rotating globe. Stay informed with live logs and archive stats.

  • Home
  • Cyber Map
  • Cyber Security News
  • Security Week News
  • The Hacker News
  • How To?
  • Toggle search form

Amazon WorkSpaces For Linux Vulnerability Let Attackers extract valid authentication token

Posted on November 7, 2025November 7, 2025 By CWS

Amazon has disclosed a major safety vulnerability in its WorkSpaces consumer for Linux that would permit unauthorized customers to extract legitimate authentication tokens and acquire unauthorized entry to different customers’ WorkSpaces.

The vulnerability, tracked as CVE-2025-12779, impacts a number of consumer variations and poses a direct risk to organizations counting on Amazon’s desktop-as-a-service platform for distant work infrastructure.

The improper dealing with of authentication tokens within the Amazon WorkSpaces consumer for Linux variations 2023.0 by 2024.8 creates a window of alternative for attackers with native machine entry.

Improper Token Dealing with Creates Safety Threat

Underneath particular circumstances, an unintended consumer on the identical consumer machine can extract legitimate DCV-based Workspace authentication tokens.

This vulnerability bypasses the authentication layer that separates particular person Workspace periods, probably exposing delicate enterprise information and confidential consumer info to lateral motion assaults.

The token extraction vulnerability represents a important oversight in credential safety mechanisms.

Whereas WorkSpaces employs a number of safety layers for cloud entry, the client-side token dealing with failed to keep up correct isolation between native customers.

Which means any consumer with command-line entry or system-level permissions on a shared consumer machine may retrieve the authentication credentials of different customers working on the identical {hardware}.

The vulnerability targets explicitly organizations using DCV-based WorkSpaces with the affected Linux consumer variations.

AttributeDetailsCVE IDCVE-2025-12779ComponentAmazon WorkSpaces Consumer for LinuxVulnerability TypeImproper Authentication Token HandlingAffected Versions2023.0 by 2024.8

This encompasses enterprises which have deployed WorkSpaces throughout Linux-based infrastructure or hybrid environments the place Linux purchasers are major entry factors.

The publicity window covers roughly two years of consumer releases, affecting a considerable consumer base that will not have actively up to date their installations.

Scope and Impression Evaluation

Amazon has proactively engaged with prospects affected by this vulnerability, notifying them of the end-of-support timeline for impacted variations.

This communication technique demonstrates AWS’s dedication to addressing the safety hole. Nevertheless, organizations with legacy consumer deployments could face challenges in fast remediation throughout their consumer base.

Amazon resolved CVE-2025-12779 within the Amazon WorkSpaces consumer for Linux model 2025.0 and later releases. Organizations working any model between 2023.0 and 2024.8 ought to prioritize upgrading instantly.

The up to date consumer is obtainable by the Amazon WorkSpaces Consumer Obtain web page, the place IT groups can retrieve the most recent model for enterprise deployment.

Safety groups ought to conduct fast stock assessments to determine all Linux WorkSpaces purchasers presently deployed of their setting.

Organizations with a number of consumer installations throughout distributed groups ought to develop a phased improve technique to attenuate disruption whereas guaranteeing well timed remediation.

This vulnerability underscores the significance of retaining software program updated and establishing common patch administration cycles for distant entry infrastructure.

Observe us on Google Information, LinkedIn, and X for every day cybersecurity updates. Contact us to function your tales.

Cyber Security News Tags:Amazon, Attackers, Authentication, Extract, Linux, Token, Valid, Vulnerability, WorkSpaces

Post navigation

Previous Post: FreeBSD-based OPNsense firewall Released for Security Issues and Improvements
Next Post: Google Launches New Maps Feature to Help Businesses Report Review-Based Extortion Attempts

Related Posts

Chaos Emerges as Faster, Smarter, and More Dangerous Ransomware Cyber Security News
Cloudflare Confirms Recent 1.1.1.1 DNS Outage Caused by BGP Attack or Hijack Cyber Security News
New ClickFake Interview Attack Using ClickFix Technique to Deliver GolangGhost Malware Cyber Security News
Critical Microsoft Office Vulnerabilities Let Attackers Execute malicious Code Cyber Security News
How Simple Prompts Can Lead to Major Breaches Cyber Security News
New SEO Poisoning Attacking Windows Users With Weaponized Software Sites Cyber Security News

Categories

  • Cyber Security News
  • How To?
  • Security Week News
  • The Hacker News

Recent Posts

  • In Other News: Controversial Ransomware Report, Gootloader Returns, More AN0M Arrests
  • From Log4j to IIS, China’s Hackers Turn Legacy Bugs into Global Espionage Tools
  • Landfall Android Spyware Targeted Samsung Phones via Zero-Day
  • New Analysis Uncovers LockBit 5.0 Key Capabilities and Two-Stage Execution Model
  • New Android Malware ‘Fantasy Hub’ Intercepts SMS Messages, Contacts and Call Logs

Pages

  • About Us – Contact
  • Disclaimer
  • Privacy Policy
  • Terms and Rules

Archives

  • November 2025
  • October 2025
  • September 2025
  • August 2025
  • July 2025
  • June 2025
  • May 2025

Recent Posts

  • In Other News: Controversial Ransomware Report, Gootloader Returns, More AN0M Arrests
  • From Log4j to IIS, China’s Hackers Turn Legacy Bugs into Global Espionage Tools
  • Landfall Android Spyware Targeted Samsung Phones via Zero-Day
  • New Analysis Uncovers LockBit 5.0 Key Capabilities and Two-Stage Execution Model
  • New Android Malware ‘Fantasy Hub’ Intercepts SMS Messages, Contacts and Call Logs

Pages

  • About Us – Contact
  • Disclaimer
  • Privacy Policy
  • Terms and Rules

Categories

  • Cyber Security News
  • How To?
  • Security Week News
  • The Hacker News