Illustration of a Linux computer screen highlighting Amazon WorkSpaces vulnerability CVE-2025-12779, with security alert and hacker elements, for a news article on AWS security flaw.
AI에 의해 생성된 이미지

Amazon discloses Linux WorkSpaces vulnerability in authentication tokens

AI에 의해 생성된 이미지

Amazon Web Services has revealed a security flaw in its WorkSpaces client for Linux that allows local attackers to extract authentication tokens and access other users' virtual desktops. The vulnerability, CVE-2025-12779, affects client versions from 2023.0 to 2024.8 and carries a CVSS score of 8.8. AWS urges immediate upgrades to version 2025.0 or later to mitigate the risk.

On November 5, 2025, AWS issued security bulletin AWS-2025-025, detailing CVE-2025-12779, a high-severity vulnerability in the Amazon WorkSpaces client for Linux. This flaw stems from improper handling of authentication tokens in versions 2023.0 through 2024.8, potentially exposing DCV-based WorkSpaces tokens to other local users on the same machine.

As described in the bulletin, “Improper handling of the authentication token in the Amazon WorkSpaces client for Linux, versions 2023.0 through 2024.8, may expose the authentication token for DCV-based WorkSpaces to other local users on the same client machine. Under certain circumstances, an unintended user may be able to extract a valid authentication token from the client machine and access another user’s WorkSpace.” This enables attackers with local access to impersonate legitimate users, bypassing standard controls and potentially accessing sensitive data in virtual environments.

The issue poses risks in shared or multi-user Linux setups, common in enterprise remote work infrastructures. With a CVSS rating of 8.8, it nearly reaches critical status, highlighting threats from lateral movement in compromised systems. AWS has confirmed the fix in version 2025.0, available via the Amazon WorkSpaces Client Download page, and announced end-of-support for affected versions.

Organizations are advised to audit deployments, prioritize upgrades, and review access logs for unauthorized activity. AWS has proactively notified impacted customers, emphasizing patch management for remote access tools. This vulnerability underscores ongoing challenges in securing desktop virtualization against local exploits.

관련 기사

Illustration of a developer's desk with a computer screen showing malicious npm packages stealing credentials across platforms, highlighting cybersecurity risks.
AI에 의해 생성된 이미지

Malicious npm packages steal developer credentials on multiple platforms

AI에 의해 보고됨 AI에 의해 생성된 이미지

Ten typosquatted npm packages, uploaded on July 4, 2025, have been found downloading an infostealer that targets sensitive data across Windows, Linux, and macOS systems. These packages, mimicking popular libraries, evaded detection through multiple obfuscation layers and amassed nearly 10,000 downloads. Cybersecurity firm Socket reported the threat, noting the packages remain available in the registry.

A critical vulnerability in the TLP Linux power management tool has been fixed after researchers discovered it allowed local attackers to bypass authentication and alter system settings. The flaw, identified in version 1.9.0 and tracked as CVE-2025-67859, stemmed from a race condition in the Polkit mechanism. TLP developers released version 1.9.1 on January 7, 2026, addressing the issue following coordinated disclosure.

AI에 의해 보고됨

NVIDIA has released an urgent security update to address a high-severity vulnerability in its NSIGHT Graphics tool for Linux systems. The flaw, identified as CVE-2025-33206, could enable attackers to execute arbitrary code if exploited. Affected users are urged to upgrade immediately to mitigate risks.

Building on the 2025 Kernel Maintainers Summit approval, the Linux kernel finalized permanent Rust integration in late 2025, highlighting early successes like the first Rust CVE detection alongside major performance and security updates in kernel 6.19 and 6.18.

AI에 의해 보고됨

Pro-Russian hackers known as Curly COMrades are exploiting Microsoft's Hyper-V technology to embed lightweight Alpine Linux virtual machines within compromised Windows systems. This tactic allows them to run custom malware like CurlyShell and CurlCat undetected by traditional endpoint detection tools. The campaign, uncovered by Bitdefender in collaboration with the Georgian CERT, targets organizations in Europe and beyond.

Security researchers at Check Point have uncovered VoidLink, a sophisticated new Linux malware framework designed to target cloud infrastructures. Written in Zig and linked to Chinese developers, it features over 30 plugins for stealthy reconnaissance, credential theft, and lateral movement. No real-world infections have been observed yet, but its capabilities signal a growing threat to enterprise cloud environments.

AI에 의해 보고됨

A new botnet known as GoBruteforcer has emerged, focusing on brute-force attacks against Linux servers. The threat was reported by IT Security News on January 12, 2026. Details highlight the botnet's specific targeting of these systems.

 

 

 

이 웹사이트는 쿠키를 사용합니다

사이트를 개선하기 위해 분석을 위한 쿠키를 사용합니다. 자세한 내용은 개인정보 보호 정책을 읽으세요.
거부