Illustration of a Linux computer screen highlighting Amazon WorkSpaces vulnerability CVE-2025-12779, with security alert and hacker elements, for a news article on AWS security flaw.
Illustration of a Linux computer screen highlighting Amazon WorkSpaces vulnerability CVE-2025-12779, with security alert and hacker elements, for a news article on AWS security flaw.
Picha iliyoundwa na AI

Amazon discloses Linux WorkSpaces vulnerability in authentication tokens

Picha iliyoundwa na AI

Amazon Web Services has revealed a security flaw in its WorkSpaces client for Linux that allows local attackers to extract authentication tokens and access other users' virtual desktops. The vulnerability, CVE-2025-12779, affects client versions from 2023.0 to 2024.8 and carries a CVSS score of 8.8. AWS urges immediate upgrades to version 2025.0 or later to mitigate the risk.

On November 5, 2025, AWS issued security bulletin AWS-2025-025, detailing CVE-2025-12779, a high-severity vulnerability in the Amazon WorkSpaces client for Linux. This flaw stems from improper handling of authentication tokens in versions 2023.0 through 2024.8, potentially exposing DCV-based WorkSpaces tokens to other local users on the same machine.

As described in the bulletin, “Improper handling of the authentication token in the Amazon WorkSpaces client for Linux, versions 2023.0 through 2024.8, may expose the authentication token for DCV-based WorkSpaces to other local users on the same client machine. Under certain circumstances, an unintended user may be able to extract a valid authentication token from the client machine and access another user’s WorkSpace.” This enables attackers with local access to impersonate legitimate users, bypassing standard controls and potentially accessing sensitive data in virtual environments.

The issue poses risks in shared or multi-user Linux setups, common in enterprise remote work infrastructures. With a CVSS rating of 8.8, it nearly reaches critical status, highlighting threats from lateral movement in compromised systems. AWS has confirmed the fix in version 2025.0, available via the Amazon WorkSpaces Client Download page, and announced end-of-support for affected versions.

Organizations are advised to audit deployments, prioritize upgrades, and review access logs for unauthorized activity. AWS has proactively notified impacted customers, emphasizing patch management for remote access tools. This vulnerability underscores ongoing challenges in securing desktop virtualization against local exploits.

Makala yanayohusiana

Illustration of a developer's desk with a computer screen showing malicious npm packages stealing credentials across platforms, highlighting cybersecurity risks.
Picha iliyoundwa na AI

Malicious npm packages steal developer credentials on multiple platforms

Imeripotiwa na AI Picha iliyoundwa na AI

Ten typosquatted npm packages, uploaded on July 4, 2025, have been found downloading an infostealer that targets sensitive data across Windows, Linux, and macOS systems. These packages, mimicking popular libraries, evaded detection through multiple obfuscation layers and amassed nearly 10,000 downloads. Cybersecurity firm Socket reported the threat, noting the packages remain available in the registry.

A critical vulnerability in the TLP Linux power management tool has been fixed after researchers discovered it allowed local attackers to bypass authentication and alter system settings. The flaw, identified in version 1.9.0 and tracked as CVE-2025-67859, stemmed from a race condition in the Polkit mechanism. TLP developers released version 1.9.1 on January 7, 2026, addressing the issue following coordinated disclosure.

Imeripotiwa na AI

NVIDIA has released an urgent security update to address a high-severity vulnerability in its NSIGHT Graphics tool for Linux systems. The flaw, identified as CVE-2025-33206, could enable attackers to execute arbitrary code if exploited. Affected users are urged to upgrade immediately to mitigate risks.

A recent Microsoft update for Windows 11 has caused a critical networking failure in the Windows Subsystem for Linux, disrupting users' access to virtual private servers. The issue affects developers and organizations relying on WSL mirror networking. Microsoft has acknowledged the problem but provided few details on a fix.

Imeripotiwa na AI

Veeam has addressed three critical-severity security vulnerabilities that could expose backup servers to remote code execution attacks. The company issued patches to mitigate these risks. The announcement highlights ongoing concerns in cybersecurity for data protection tools.

Building on earlier PeerBlight attacks, Google Threat Intelligence reports exploitation of the React2Shell vulnerability (CVE-2025-55182) by China-nexus clusters and financially motivated actors deploying backdoors and cryptocurrency miners on vulnerable React and Next.js systems.

Imeripotiwa na AI

Two groups linked to China are exploiting a newly discovered vulnerability in Cisco's email security products. The campaign involves zero-day attacks, highlighting ongoing cybersecurity risks. The issue was reported on December 19, 2025.

Jumatano, 11. Mwezi wa tatu 2026, 14:00:34

Google report warns of shifting cloud threat landscape

Jumanne, 17. Mwezi wa pili 2026, 02:30:36

Research uncovers flaws in password managers' zero-knowledge claims

Jumanne, 10. Mwezi wa pili 2026, 10:59:26

BeyondTrust RCE flaw enables code execution without login

Jumapili, 8. Mwezi wa pili 2026, 14:27:57

Alfie Emanuele to tackle Linux credential gaps at FOSDEM 2026

Alhamisi, 5. Mwezi wa pili 2026, 15:05:32

Critical flaws discovered in n8n workflow tool

Jumatano, 4. Mwezi wa pili 2026, 19:25:39

Russian hackers exploit Microsoft Office vulnerability days after patch

Jumamosi, 17. Mwezi wa kwanza 2026, 16:30:57

GNU C Library fixes security issue from 1996

Jumanne, 13. Mwezi wa kwanza 2026, 14:43:27

US government urged to patch critical Gogs security flaw

Jumatatu, 22. Mwezi wa kumi na mbili 2025, 14:24:19

WatchGuard Firebox OS patches critical security flaw

Jumanne, 16. Mwezi wa kumi na mbili 2025, 23:12:04

React2Shell exploits continue with large-scale Linux backdoor deployments and cloud credential theft

 

 

 

Tovuti hii inatumia vidakuzi

Tunatumia vidakuzi kwa uchambuzi ili kuboresha tovuti yetu. Soma sera ya faragha yetu kwa maelezo zaidi.
Kataa