Amazon Web Services (AWS) has remediated a high-severity vulnerability, CVE-2025-12779, in its Amazon WorkSpaces client for the Linux operating system. The flaw, which carries a CVSS score of 8.8, stemmed from the improper handling of authentication tokens. Under specific conditions, this could allow a local user on a multi-user machine to extract a valid authentication token belonging to another user. An attacker could then use this token to hijack the victim's active DCV-based WorkSpace (virtual desktop) session. The vulnerability affects client versions from 2023.0 to 2024.8. AWS has released version 2025.0 of the Linux client to address the issue and advises all customers to upgrade promptly.
There is no public evidence of in-the-wild exploitation at this time. The vulnerability was disclosed responsibly to AWS, allowing them to prepare and release a patch. However, the technical details are now public, increasing the likelihood of future exploitation attempts against unpatched systems.
While the attack vector is local, the impact is significant for organizations that use shared Linux workstations. An attacker could gain full access to a colleague's or another user's entire work environment. This could lead to:
D3-AI: Asset Identification.D3-UBA: User Behavior Analysis.D3-SU: Software Update.Upgrading the client to the patched version is the definitive fix for this vulnerability.
Mapped D3FEND Techniques:
Ensuring that user-specific application data is not readable by other users on the system is a fundamental control against this type of local flaw.
Mapped D3FEND Techniques:
The primary and most effective countermeasure is to immediately deploy the updated Amazon WorkSpaces client for Linux, version 2025.0 or later. This version contains the fix from AWS that properly secures the handling of authentication tokens. System administrators should use endpoint management tools or deployment scripts to push this update to all Linux workstations with the client installed. Verification can be done by remotely querying the client version number to ensure compliance across the entire fleet. Given the high severity of the flaw, this should be treated as a priority patch.
As a defense-in-depth measure, system administrators should ensure that user home directories and application-specific configuration folders (like ~/.config/Amazon Web Services/) have strict file permissions. Each user's directory should be configured so that it is not readable or writable by any other local user on the system (e.g., permissions set to 700). This hardening practice helps mitigate the risk of CVE-2025-12779 and a broad class of other local information disclosure vulnerabilities by enforcing user separation at the filesystem level. This is especially critical on multi-user, shared workstations.

Cybersecurity professional with over 10 years of specialized experience in security operations, threat intelligence, incident response, and security automation. Expertise spans SOAR/XSOAR orchestration, threat intelligence platforms, SIEM/UEBA analytics, and building cyber fusion centers. Background includes technical enablement, solution architecture for enterprise and government clients, and implementing security automation workflows across IR, TIP, and SOC use cases.
Help others stay informed about cybersecurity threats