Illustration of a Linux computer screen highlighting Amazon WorkSpaces vulnerability CVE-2025-12779, with security alert and hacker elements, for a news article on AWS security flaw.
Picha iliyoundwa na AI

Amazon discloses Linux WorkSpaces vulnerability in authentication tokens

Picha iliyoundwa na AI

Amazon Web Services has revealed a security flaw in its WorkSpaces client for Linux that allows local attackers to extract authentication tokens and access other users' virtual desktops. The vulnerability, CVE-2025-12779, affects client versions from 2023.0 to 2024.8 and carries a CVSS score of 8.8. AWS urges immediate upgrades to version 2025.0 or later to mitigate the risk.

On November 5, 2025, AWS issued security bulletin AWS-2025-025, detailing CVE-2025-12779, a high-severity vulnerability in the Amazon WorkSpaces client for Linux. This flaw stems from improper handling of authentication tokens in versions 2023.0 through 2024.8, potentially exposing DCV-based WorkSpaces tokens to other local users on the same machine.

As described in the bulletin, “Improper handling of the authentication token in the Amazon WorkSpaces client for Linux, versions 2023.0 through 2024.8, may expose the authentication token for DCV-based WorkSpaces to other local users on the same client machine. Under certain circumstances, an unintended user may be able to extract a valid authentication token from the client machine and access another user’s WorkSpace.” This enables attackers with local access to impersonate legitimate users, bypassing standard controls and potentially accessing sensitive data in virtual environments.

The issue poses risks in shared or multi-user Linux setups, common in enterprise remote work infrastructures. With a CVSS rating of 8.8, it nearly reaches critical status, highlighting threats from lateral movement in compromised systems. AWS has confirmed the fix in version 2025.0, available via the Amazon WorkSpaces Client Download page, and announced end-of-support for affected versions.

Organizations are advised to audit deployments, prioritize upgrades, and review access logs for unauthorized activity. AWS has proactively notified impacted customers, emphasizing patch management for remote access tools. This vulnerability underscores ongoing challenges in securing desktop virtualization against local exploits.

Makala yanayohusiana

Illustration of a developer's desk with a computer screen showing malicious npm packages stealing credentials across platforms, highlighting cybersecurity risks.
Picha iliyoundwa na AI

Malicious npm packages steal developer credentials on multiple platforms

Imeripotiwa na AI Picha iliyoundwa na AI

Ten typosquatted npm packages, uploaded on July 4, 2025, have been found downloading an infostealer that targets sensitive data across Windows, Linux, and macOS systems. These packages, mimicking popular libraries, evaded detection through multiple obfuscation layers and amassed nearly 10,000 downloads. Cybersecurity firm Socket reported the threat, noting the packages remain available in the registry.

A critical vulnerability in the TLP Linux power management tool has been fixed after researchers discovered it allowed local attackers to bypass authentication and alter system settings. The flaw, identified in version 1.9.0 and tracked as CVE-2025-67859, stemmed from a race condition in the Polkit mechanism. TLP developers released version 1.9.1 on January 7, 2026, addressing the issue following coordinated disclosure.

Imeripotiwa na AI

NVIDIA has released an urgent security update to address a high-severity vulnerability in its NSIGHT Graphics tool for Linux systems. The flaw, identified as CVE-2025-33206, could enable attackers to execute arbitrary code if exploited. Affected users are urged to upgrade immediately to mitigate risks.

Building on the 2025 Kernel Maintainers Summit approval, the Linux kernel finalized permanent Rust integration in late 2025, highlighting early successes like the first Rust CVE detection alongside major performance and security updates in kernel 6.19 and 6.18.

Imeripotiwa na AI

Pro-Russian hackers known as Curly COMrades are exploiting Microsoft's Hyper-V technology to embed lightweight Alpine Linux virtual machines within compromised Windows systems. This tactic allows them to run custom malware like CurlyShell and CurlCat undetected by traditional endpoint detection tools. The campaign, uncovered by Bitdefender in collaboration with the Georgian CERT, targets organizations in Europe and beyond.

Security researchers at Check Point have uncovered VoidLink, a sophisticated new Linux malware framework designed to target cloud infrastructures. Written in Zig and linked to Chinese developers, it features over 30 plugins for stealthy reconnaissance, credential theft, and lateral movement. No real-world infections have been observed yet, but its capabilities signal a growing threat to enterprise cloud environments.

Imeripotiwa na AI

A new botnet known as GoBruteforcer has emerged, focusing on brute-force attacks against Linux servers. The threat was reported by IT Security News on January 12, 2026. Details highlight the botnet's specific targeting of these systems.

Jumanne, 27. Mwezi wa kwanza 2026, 06:48:31

Zombie domains expose Snap Store to supply chain attacks

Ijumaa, 23. Mwezi wa kwanza 2026, 02:03:13

Huge data leak exposes 149 million credentials without protection

Jumatano, 21. Mwezi wa kwanza 2026, 09:23:25

Anthropic's Git MCP server revealed security flaws

Jumamosi, 17. Mwezi wa kwanza 2026, 16:30:57

GNU C Library fixes security issue from 1996

Jumanne, 13. Mwezi wa kwanza 2026, 14:43:27

US government urged to patch critical Gogs security flaw

Alhamisi, 8. Mwezi wa kwanza 2026, 08:48:32

The myth of Linux's invincibility in enterprise security

Jumanne, 16. Mwezi wa kumi na mbili 2025, 23:12:04

React2Shell exploits continue with large-scale Linux backdoor deployments and cloud credential theft

Jumanne, 16. Mwezi wa kumi na mbili 2025, 13:36:33

Microsoft update breaks WSL mirror networking for VPS access

Jumanne, 16. Mwezi wa kumi na mbili 2025, 12:38:54

Compromised IAM credentials drive AWS crypto mining campaign

Jumatatu, 15. Mwezi wa kumi na mbili 2025, 06:55:49

Kali Linux 2025.4 introduces desktop enhancements and new tools

 

 

 

Tovuti hii inatumia vidakuzi

Tunatumia vidakuzi kwa uchambuzi ili kuboresha tovuti yetu. Soma sera ya faragha yetu kwa maelezo zaidi.
Kataa