Amazon recently issued a security advisory regarding two vulnerabilities affecting specific versions of its native clients for Amazon WorkSpaces, Amazon AppStream 2.0, and Amazon DCV. These vulnerabilities, identified as CVE-2025-0500 and CVE-2025-0501, carry a CVSSv4 score of 7.7. The vulnerabilities, if exploited, could allow attackers to perform man-in-the-middle (MITM) attacks, granting unauthorized access to remote sessions.
CVE-2025-0500 impacts native clients for Amazon WorkSpaces using the Amazon DCV protocol, as well as Amazon AppStream 2.0 and Amazon DCV clients. In its advisory, Amazon stated, “If leveraged, this issue could allow a bad actor to perform a man-in-the-middle attack, allowing them to access remote WorkSpaces, AppStream, or DCV sessions.”
Affected versions include:
- Amazon WorkSpaces: Windows client 5.20.0 or earlier, macOS client 5.20.0 or earlier, and Linux client 2024.1 or earlier.
- Amazon AppStream 2.0: Windows client 1.1.1326 or earlier.
- Amazon DCV: Various client versions across platforms, including Windows 2023.1.8993 or earlier.
CVE-2025-0501 specifically targets Amazon WorkSpaces clients using the PCoIP protocol. Exploitation could lead to unauthorized access to remote WorkSpaces sessions via MITM attacks.
Affected versions include:
- Amazon WorkSpaces: Windows client 5.22.0 or earlier, macOS client 5.22.0 or earlier, Linux client 2024.5 or earlier, and Android client 5.0.0 or earlier.
Amazon has released patched versions, including Amazon WorkSpaces 5.22.1 (Windows/macOS), 2024.6 (Linux), or 5.0.1 (Android), and Amazon DCV 2023.1.9127. Users are strongly encouraged to update to these or newer versions to mitigate risks.
Related Posts:
- Google Patches Workspace Authentication Flaw, Thwarting Account Takeover Attempts
- Google Cloud Services Disrupted in UK Due to Power Outage
- Exposed: Hidden Risks in Google Workspace’s Domain Delegation
- Russia blocks 1.8 million Amazon and Google cloud service IP addresses