CVE-2025-12779: CWE-497 Access of Sensitive System Information to an Unauthorized Control Sphere in Amazon Amazon WorkSpaces
Improper handling of the authentication token in the Amazon WorkSpaces client for Linux, versions 2023.0 through 2024.8, may expose the authentication token for DCV-based WorkSpaces to other local users on the same client machine. Under certain circumstances, a local user may be able to extract another local user's authentication token from the shared client machine and access their WorkSpace. To mitigate this issue, users should upgrade to the Amazon WorkSpaces client for Linux version 2025.0 or later.
AI Analysis
Technical Summary
CVE-2025-12779 is a vulnerability classified under CWE-497, indicating unauthorized access to sensitive system information. It affects the Amazon WorkSpaces client for Linux versions 2023.0 through 2024.8. The root cause is improper handling of authentication tokens used for DCV-based WorkSpaces sessions. Specifically, the client fails to adequately isolate or protect these tokens in the local environment, allowing other local users on the same machine to extract them. Once an attacker obtains another user's authentication token, they can impersonate that user and access their WorkSpace environment without needing additional credentials or user interaction. The vulnerability requires the attacker to have local access with limited privileges (PR:L) but does not require user interaction (UI:N). The impact on confidentiality, integrity, and availability is high because unauthorized access to a WorkSpace can lead to data theft, manipulation, or disruption of services. The vulnerability has a CVSS 4.0 score of 8.8, reflecting its critical nature. Amazon has released version 2025.0 of the WorkSpaces client for Linux to remediate this issue by improving token handling and isolation. No known exploits are currently in the wild, but the vulnerability's characteristics make it a significant risk in multi-user Linux environments where WorkSpaces clients are used.
Potential Impact
For European organizations, this vulnerability poses a significant risk to the confidentiality and integrity of remote desktop sessions conducted via Amazon WorkSpaces on Linux clients. Attackers with local access to shared machines—such as in co-working spaces, shared offices, or multi-user systems—could extract authentication tokens and gain unauthorized access to sensitive corporate environments. This could lead to data breaches, intellectual property theft, or unauthorized changes to critical systems. The availability of WorkSpaces sessions could also be impacted if attackers disrupt or lock out legitimate users. Organizations relying heavily on Amazon WorkSpaces for remote work, especially those with Linux-based client deployments, face increased exposure. The risk is heightened in sectors with stringent data protection requirements such as finance, healthcare, and government agencies across Europe. Additionally, the vulnerability could facilitate lateral movement within networks if attackers escalate privileges after initial token theft.
Mitigation Recommendations
European organizations should immediately upgrade all Amazon WorkSpaces Linux clients to version 2025.0 or later to remediate this vulnerability. Beyond patching, organizations should enforce strict local user access controls on shared machines to limit the number of users with local login capabilities. Implementing endpoint security solutions that monitor for unusual token access or extraction attempts can provide early detection. Employing multi-factor authentication (MFA) for WorkSpaces sessions can add an additional layer of security, mitigating risks if tokens are compromised. Network segmentation should be used to isolate critical WorkSpaces environments from less secure local user environments. Regular audits of user permissions and session logs can help identify suspicious activity. Finally, educating users about the risks of shared machines and enforcing policies to avoid sharing Linux client devices for WorkSpaces access can reduce exposure.
Affected Countries
Germany, United Kingdom, France, Netherlands, Sweden, Ireland
CVE-2025-12779: CWE-497 Access of Sensitive System Information to an Unauthorized Control Sphere in Amazon Amazon WorkSpaces
Description
Improper handling of the authentication token in the Amazon WorkSpaces client for Linux, versions 2023.0 through 2024.8, may expose the authentication token for DCV-based WorkSpaces to other local users on the same client machine. Under certain circumstances, a local user may be able to extract another local user's authentication token from the shared client machine and access their WorkSpace. To mitigate this issue, users should upgrade to the Amazon WorkSpaces client for Linux version 2025.0 or later.
AI-Powered Analysis
Technical Analysis
CVE-2025-12779 is a vulnerability classified under CWE-497, indicating unauthorized access to sensitive system information. It affects the Amazon WorkSpaces client for Linux versions 2023.0 through 2024.8. The root cause is improper handling of authentication tokens used for DCV-based WorkSpaces sessions. Specifically, the client fails to adequately isolate or protect these tokens in the local environment, allowing other local users on the same machine to extract them. Once an attacker obtains another user's authentication token, they can impersonate that user and access their WorkSpace environment without needing additional credentials or user interaction. The vulnerability requires the attacker to have local access with limited privileges (PR:L) but does not require user interaction (UI:N). The impact on confidentiality, integrity, and availability is high because unauthorized access to a WorkSpace can lead to data theft, manipulation, or disruption of services. The vulnerability has a CVSS 4.0 score of 8.8, reflecting its critical nature. Amazon has released version 2025.0 of the WorkSpaces client for Linux to remediate this issue by improving token handling and isolation. No known exploits are currently in the wild, but the vulnerability's characteristics make it a significant risk in multi-user Linux environments where WorkSpaces clients are used.
Potential Impact
For European organizations, this vulnerability poses a significant risk to the confidentiality and integrity of remote desktop sessions conducted via Amazon WorkSpaces on Linux clients. Attackers with local access to shared machines—such as in co-working spaces, shared offices, or multi-user systems—could extract authentication tokens and gain unauthorized access to sensitive corporate environments. This could lead to data breaches, intellectual property theft, or unauthorized changes to critical systems. The availability of WorkSpaces sessions could also be impacted if attackers disrupt or lock out legitimate users. Organizations relying heavily on Amazon WorkSpaces for remote work, especially those with Linux-based client deployments, face increased exposure. The risk is heightened in sectors with stringent data protection requirements such as finance, healthcare, and government agencies across Europe. Additionally, the vulnerability could facilitate lateral movement within networks if attackers escalate privileges after initial token theft.
Mitigation Recommendations
European organizations should immediately upgrade all Amazon WorkSpaces Linux clients to version 2025.0 or later to remediate this vulnerability. Beyond patching, organizations should enforce strict local user access controls on shared machines to limit the number of users with local login capabilities. Implementing endpoint security solutions that monitor for unusual token access or extraction attempts can provide early detection. Employing multi-factor authentication (MFA) for WorkSpaces sessions can add an additional layer of security, mitigating risks if tokens are compromised. Network segmentation should be used to isolate critical WorkSpaces environments from less secure local user environments. Regular audits of user permissions and session logs can help identify suspicious activity. Finally, educating users about the risks of shared machines and enforcing policies to avoid sharing Linux client devices for WorkSpaces access can reduce exposure.
Affected Countries
For access to advanced analysis and higher rate limits, contact root@offseq.com
Technical Details
- Data Version
- 5.2
- Assigner Short Name
- AMZN
- Date Reserved
- 2025-11-05T20:58:46.275Z
- Cvss Version
- 4.0
- State
- PUBLISHED
Threat ID: 690bc2956ab8174a0d403370
Added to database: 11/5/2025, 9:33:09 PM
Last enriched: 11/12/2025, 10:04:01 PM
Last updated: 12/21/2025, 11:37:23 AM
Views: 175
Community Reviews
0 reviewsCrowdsource mitigation strategies, share intel context, and vote on the most helpful responses. Sign in to add your voice and help keep defenders ahead.
Want to contribute mitigation steps or threat intel context? Sign in or create an account to join the community discussion.
Related Threats
CVE-2025-14995: Stack-based Buffer Overflow in Tenda FH1201
HighCVE-2025-14994: Stack-based Buffer Overflow in Tenda FH1201
HighCVE-2025-14855: CWE-79 Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting') in brainstormforce SureForms – Contact Form, Payment Form & Other Custom Form Builder
HighCVE-2025-14800: CWE-434 Unrestricted Upload of File with Dangerous Type in themeisle Redirection for Contact Form 7
HighCVE-2025-14993: Stack-based Buffer Overflow in Tenda AC18
HighActions
Updates to AI analysis require Pro Console access. Upgrade inside Console → Billing.
Need enhanced features?
Contact root@offseq.com for Pro access with improved analysis and higher rate limits.