Illustration of a Linux computer screen highlighting Amazon WorkSpaces vulnerability CVE-2025-12779, with security alert and hacker elements, for a news article on AWS security flaw.
Illustration of a Linux computer screen highlighting Amazon WorkSpaces vulnerability CVE-2025-12779, with security alert and hacker elements, for a news article on AWS security flaw.
Picha iliyoundwa na AI

Amazon discloses Linux WorkSpaces vulnerability in authentication tokens

Picha iliyoundwa na AI

Amazon Web Services has revealed a security flaw in its WorkSpaces client for Linux that allows local attackers to extract authentication tokens and access other users' virtual desktops. The vulnerability, CVE-2025-12779, affects client versions from 2023.0 to 2024.8 and carries a CVSS score of 8.8. AWS urges immediate upgrades to version 2025.0 or later to mitigate the risk.

On November 5, 2025, AWS issued security bulletin AWS-2025-025, detailing CVE-2025-12779, a high-severity vulnerability in the Amazon WorkSpaces client for Linux. This flaw stems from improper handling of authentication tokens in versions 2023.0 through 2024.8, potentially exposing DCV-based WorkSpaces tokens to other local users on the same machine.

As described in the bulletin, “Improper handling of the authentication token in the Amazon WorkSpaces client for Linux, versions 2023.0 through 2024.8, may expose the authentication token for DCV-based WorkSpaces to other local users on the same client machine. Under certain circumstances, an unintended user may be able to extract a valid authentication token from the client machine and access another user’s WorkSpace.” This enables attackers with local access to impersonate legitimate users, bypassing standard controls and potentially accessing sensitive data in virtual environments.

The issue poses risks in shared or multi-user Linux setups, common in enterprise remote work infrastructures. With a CVSS rating of 8.8, it nearly reaches critical status, highlighting threats from lateral movement in compromised systems. AWS has confirmed the fix in version 2025.0, available via the Amazon WorkSpaces Client Download page, and announced end-of-support for affected versions.

Organizations are advised to audit deployments, prioritize upgrades, and review access logs for unauthorized activity. AWS has proactively notified impacted customers, emphasizing patch management for remote access tools. This vulnerability underscores ongoing challenges in securing desktop virtualization against local exploits.

Makala yanayohusiana

Illustration depicting the Linux CopyFail vulnerability enabling root access exploits alongside Ubuntu's DDoS-induced outage.
Picha iliyoundwa na AI

Linux CopyFail exploit threatens root access amid Ubuntu outage

Imeripotiwa na AI Picha iliyoundwa na AI

A critical Linux vulnerability known as CopyFail, tracked as CVE-2026-31431, allows attackers to gain root access on systems running kernels since 2017. Publicly released exploit code has heightened risks for data centers and personal devices. Ubuntu's infrastructure has been offline for over a day due to a DDoS attack, hampering security communications.

Four days after the CopyFail (CVE-2026-31431) exploit disclosure disrupted Ubuntu services, the US government warned of its critical risks to Linux systems, urging immediate patching amid public exploit code.

Imeripotiwa na AI

Microsoft has released an emergency patch for a high-severity vulnerability in its ASP.NET Core framework, affecting macOS and Linux applications. Tracked as CVE-2026-40372, the flaw allows unauthenticated attackers to gain SYSTEM privileges through forged authentication payloads. The company advises immediate updates and key rotation to fully mitigate risks.

Jumamosi, 9. Mwezi wa tano 2026, 20:17:43

New dirty frag exploit grants root access on linux systems

Jumatatu, 4. Mwezi wa tano 2026, 03:03:04

Red Hat directs users to security page for CopyFail vulnerability

Ijumaa, 3. Mwezi wa nne 2026, 10:14:58

OpenClaw patches severe vulnerability granting admin access

Jumatatu, 23. Mwezi wa tatu 2026, 09:31:59

Researchers uncover leaked API keys on nearly 10,000 websites

Jumatano, 18. Mwezi wa pili 2026, 11:16:48

Dell zero-day flaw unpatched for nearly two years

Tovuti hii inatumia vidakuzi

Tunatumia vidakuzi kwa uchambuzi ili kuboresha tovuti yetu. Soma sera ya faragha yetu kwa maelezo zaidi.
Kataa