Skip to main content
Press slash or control plus K to focus the search. Use the arrow keys to navigate results and press enter to open a threat.
Reconnecting to live updates…

CVE-2025-12779: CWE-497 Access of Sensitive System Information to an Unauthorized Control Sphere in Amazon Amazon WorkSpaces

0
High
VulnerabilityCVE-2025-12779cvecve-2025-12779cwe-497
Published: Wed Nov 05 2025 (11/05/2025, 21:20:51 UTC)
Source: CVE Database V5
Vendor/Project: Amazon
Product: Amazon WorkSpaces

Description

Improper handling of the authentication token in the Amazon WorkSpaces client for Linux, versions 2023.0 through 2024.8, may expose the authentication token for DCV-based WorkSpaces to other local users on the same client machine. Under certain circumstances, a local user may be able to extract another local user's authentication token from the shared client machine and access their WorkSpace. To mitigate this issue, users should upgrade to the Amazon WorkSpaces client for Linux version 2025.0 or later.

AI-Powered Analysis

AILast updated: 11/12/2025, 22:04:01 UTC

Technical Analysis

CVE-2025-12779 is a vulnerability classified under CWE-497, indicating unauthorized access to sensitive system information. It affects the Amazon WorkSpaces client for Linux versions 2023.0 through 2024.8. The root cause is improper handling of authentication tokens used for DCV-based WorkSpaces sessions. Specifically, the client fails to adequately isolate or protect these tokens in the local environment, allowing other local users on the same machine to extract them. Once an attacker obtains another user's authentication token, they can impersonate that user and access their WorkSpace environment without needing additional credentials or user interaction. The vulnerability requires the attacker to have local access with limited privileges (PR:L) but does not require user interaction (UI:N). The impact on confidentiality, integrity, and availability is high because unauthorized access to a WorkSpace can lead to data theft, manipulation, or disruption of services. The vulnerability has a CVSS 4.0 score of 8.8, reflecting its critical nature. Amazon has released version 2025.0 of the WorkSpaces client for Linux to remediate this issue by improving token handling and isolation. No known exploits are currently in the wild, but the vulnerability's characteristics make it a significant risk in multi-user Linux environments where WorkSpaces clients are used.

Potential Impact

For European organizations, this vulnerability poses a significant risk to the confidentiality and integrity of remote desktop sessions conducted via Amazon WorkSpaces on Linux clients. Attackers with local access to shared machines—such as in co-working spaces, shared offices, or multi-user systems—could extract authentication tokens and gain unauthorized access to sensitive corporate environments. This could lead to data breaches, intellectual property theft, or unauthorized changes to critical systems. The availability of WorkSpaces sessions could also be impacted if attackers disrupt or lock out legitimate users. Organizations relying heavily on Amazon WorkSpaces for remote work, especially those with Linux-based client deployments, face increased exposure. The risk is heightened in sectors with stringent data protection requirements such as finance, healthcare, and government agencies across Europe. Additionally, the vulnerability could facilitate lateral movement within networks if attackers escalate privileges after initial token theft.

Mitigation Recommendations

European organizations should immediately upgrade all Amazon WorkSpaces Linux clients to version 2025.0 or later to remediate this vulnerability. Beyond patching, organizations should enforce strict local user access controls on shared machines to limit the number of users with local login capabilities. Implementing endpoint security solutions that monitor for unusual token access or extraction attempts can provide early detection. Employing multi-factor authentication (MFA) for WorkSpaces sessions can add an additional layer of security, mitigating risks if tokens are compromised. Network segmentation should be used to isolate critical WorkSpaces environments from less secure local user environments. Regular audits of user permissions and session logs can help identify suspicious activity. Finally, educating users about the risks of shared machines and enforcing policies to avoid sharing Linux client devices for WorkSpaces access can reduce exposure.

Need more detailed analysis?Get Pro

Technical Details

Data Version
5.2
Assigner Short Name
AMZN
Date Reserved
2025-11-05T20:58:46.275Z
Cvss Version
4.0
State
PUBLISHED

Threat ID: 690bc2956ab8174a0d403370

Added to database: 11/5/2025, 9:33:09 PM

Last enriched: 11/12/2025, 10:04:01 PM

Last updated: 12/21/2025, 11:37:23 AM

Views: 175

Community Reviews

0 reviews

Crowdsource mitigation strategies, share intel context, and vote on the most helpful responses. Sign in to add your voice and help keep defenders ahead.

Sort by
Loading community insights…

Want to contribute mitigation steps or threat intel context? Sign in or create an account to join the community discussion.

Actions

PRO

Updates to AI analysis require Pro Console access. Upgrade inside Console → Billing.

Please log in to the Console to use AI analysis features.

Need enhanced features?

Contact root@offseq.com for Pro access with improved analysis and higher rate limits.

Latest Threats