During the AWS Client VPN client installation on Windows devices, the install process references the C:\usr\local\windows-x86_64-openssl-localbuild\ssl directory location to fetch the OpenSSL configuration file. As a result, a non-admin user could place arbitrary code in the configuration file. If an admin user starts the AWS Client VPN client installation process, that code could be executed with root-level privileges. This issue does not affect Linux or Mac devices.
We recommend users discontinue any new installations of AWS Client VPN on Windows prior to version 5.2.2.
References
Configurations
No configuration.
History
23 Jul 2025, 16:15
Type | Values Removed | Values Added |
---|---|---|
New CVE |
Information
Published : 2025-07-23 16:15
Updated : 2025-07-25 15:29
NVD link : CVE-2025-8069
Mitre link : CVE-2025-8069
CVE.ORG link : CVE-2025-8069
JSON object : View
Products Affected
No product.
CWE
CWE-276
Incorrect Default Permissions