Skip to content
  • Home
  • Cyber Map
  • About Us – Contact
  • Disclaimer
  • Terms and Rules
  • Privacy Policy
Cyber Web Spider Blog – News

Cyber Web Spider Blog – News

Globe Threat Map provides a real-time, interactive 3D visualization of global cyber threats. Monitor DDoS attacks, malware, and hacking attempts with geo-located arcs on a rotating globe. Stay informed with live logs and archive stats.

  • Home
  • Cyber Map
  • Cyber Security News
  • Security Week News
  • The Hacker News
  • How To?
  • Toggle search form
Amazon WorkSpaces For Linux Vulnerability Let Attackers extract valid authentication token

Amazon WorkSpaces For Linux Vulnerability Let Attackers extract valid authentication token

Posted on November 7, 2025November 7, 2025 By CWS

Amazon has disclosed a major safety vulnerability in its WorkSpaces consumer for Linux that would permit unauthorized customers to extract legitimate authentication tokens and acquire unauthorized entry to different customers’ WorkSpaces.

The vulnerability, tracked as CVE-2025-12779, impacts a number of consumer variations and poses a direct risk to organizations counting on Amazon’s desktop-as-a-service platform for distant work infrastructure.

The improper dealing with of authentication tokens within the Amazon WorkSpaces consumer for Linux variations 2023.0 by 2024.8 creates a window of alternative for attackers with native machine entry.

Improper Token Dealing with Creates Safety Threat

Underneath particular circumstances, an unintended consumer on the identical consumer machine can extract legitimate DCV-based Workspace authentication tokens.

This vulnerability bypasses the authentication layer that separates particular person Workspace periods, probably exposing delicate enterprise information and confidential consumer info to lateral motion assaults.

The token extraction vulnerability represents a important oversight in credential safety mechanisms.

Whereas WorkSpaces employs a number of safety layers for cloud entry, the client-side token dealing with failed to keep up correct isolation between native customers.

Which means any consumer with command-line entry or system-level permissions on a shared consumer machine may retrieve the authentication credentials of different customers working on the identical {hardware}.

The vulnerability targets explicitly organizations using DCV-based WorkSpaces with the affected Linux consumer variations.

AttributeDetailsCVE IDCVE-2025-12779ComponentAmazon WorkSpaces Consumer for LinuxVulnerability TypeImproper Authentication Token HandlingAffected Versions2023.0 by 2024.8

This encompasses enterprises which have deployed WorkSpaces throughout Linux-based infrastructure or hybrid environments the place Linux purchasers are major entry factors.

The publicity window covers roughly two years of consumer releases, affecting a considerable consumer base that will not have actively up to date their installations.

Scope and Impression Evaluation

Amazon has proactively engaged with prospects affected by this vulnerability, notifying them of the end-of-support timeline for impacted variations.

This communication technique demonstrates AWS’s dedication to addressing the safety hole. Nevertheless, organizations with legacy consumer deployments could face challenges in fast remediation throughout their consumer base.

Amazon resolved CVE-2025-12779 within the Amazon WorkSpaces consumer for Linux model 2025.0 and later releases. Organizations working any model between 2023.0 and 2024.8 ought to prioritize upgrading instantly.

The up to date consumer is obtainable by the Amazon WorkSpaces Consumer Obtain web page, the place IT groups can retrieve the most recent model for enterprise deployment.

Safety groups ought to conduct fast stock assessments to determine all Linux WorkSpaces purchasers presently deployed of their setting.

Organizations with a number of consumer installations throughout distributed groups ought to develop a phased improve technique to attenuate disruption whereas guaranteeing well timed remediation.

This vulnerability underscores the significance of retaining software program updated and establishing common patch administration cycles for distant entry infrastructure.

Observe us on Google Information, LinkedIn, and X for every day cybersecurity updates. Contact us to function your tales.

Cyber Security News Tags:Amazon, Attackers, Authentication, Extract, Linux, Token, Valid, Vulnerability, WorkSpaces

Post navigation

Previous Post: FreeBSD-based OPNsense firewall Released for Security Issues and Improvements
Next Post: 18 Arrested in Crackdown on Credit Card Fraud Rings

Related Posts

RedNovember Hackers Attacking Government and Technology Organizations to Deploy Backdoor RedNovember Hackers Attacking Government and Technology Organizations to Deploy Backdoor Cyber Security News
Axis Camera Server Vulnerabilities Exposes Thousands of Organizations to Attack Axis Camera Server Vulnerabilities Exposes Thousands of Organizations to Attack Cyber Security News
Critical Microsoft .NET Vulnerability Demands Immediate Attention Critical Microsoft .NET Vulnerability Demands Immediate Attention Cyber Security News
PoC Exploit Released HPE OneView Vulnerability that Enables Remote Code Execution PoC Exploit Released HPE OneView Vulnerability that Enables Remote Code Execution Cyber Security News
What is Use-After-Free Vulnerability? – Impact and Mitigation What is Use-After-Free Vulnerability? – Impact and Mitigation Cyber Security News
Windows Agere Modem Driver 0-Day Vulnerabilities Actively Exploited To Escalate Privileges Windows Agere Modem Driver 0-Day Vulnerabilities Actively Exploited To Escalate Privileges Cyber Security News

Categories

  • Cyber Security News
  • How To?
  • Security Week News
  • The Hacker News

Recent Posts

  • VMware Fusion Vulnerability Receives Critical Update
  • Critical Vulnerability in MongoDB Risks Data Exposure
  • Windows Zero-Day Exploits: YellowKey and GreenPlasma Revealed
  • Fragnesia Linux Kernel Vulnerability Allows Root Access
  • NGINX Vulnerability Allows Remote Code Execution

Pages

  • About Us – Contact
  • Disclaimer
  • Privacy Policy
  • Terms and Rules

Archives

  • May 2026
  • April 2026
  • March 2026
  • February 2026
  • January 2026
  • December 2025
  • November 2025
  • October 2025
  • September 2025
  • August 2025
  • July 2025
  • June 2025
  • May 2025

Recent Posts

  • VMware Fusion Vulnerability Receives Critical Update
  • Critical Vulnerability in MongoDB Risks Data Exposure
  • Windows Zero-Day Exploits: YellowKey and GreenPlasma Revealed
  • Fragnesia Linux Kernel Vulnerability Allows Root Access
  • NGINX Vulnerability Allows Remote Code Execution

Pages

  • About Us – Contact
  • Disclaimer
  • Privacy Policy
  • Terms and Rules

Categories

  • Cyber Security News
  • How To?
  • Security Week News
  • The Hacker News

Copyright © 2026 Cyber Web Spider Blog – News.

Powered by PressBook Masonry Dark