AWS-2025-014
Scope: AWS
Content Type: Important (requires attention)
Publication Date:** 2025/07/23 8:30 AM PDT **Description:
AWS Client VPN is a managed client-based VPN service that enables secure access to AWS and on-premises resources. The AWS Client VPN client software runs on end-user devices, supporting Windows, macOS, and Linux and provides the ability for end users to establish a secure tunnel to the AWS Client VPN Service.
We identified CVE-[已去除电话], an issue in AWS Client VPN. During the AWS Client VPN client installation on Windows devices, the install process references the C:\usr\local\windows-x86_64-openssl-localbuild\ssl directory location to fetch the OpenSSL configuration file. As a result, a non-admin user could place arbitrary code in the configuration file. If an admin user starts the AWS Client VPN client installation process, that code could be executed with root-level privileges. This issue does not affect Linux or Mac devices.
Affected version: 4.1.0, 5.0.0, 5.0.1, 5.0.2, 5.1.0, 5.2.0, 5.2.1
Resolution:
This issue has been addressed in AWS Client VPN Client version 5.2.2. We recommend users discontinue any new installations of AWS Client VPN on Windows prior to version 5.2.2.
Workaround:
N/A
References:** **Acknowledgement:
We would like to thank Zero Day Initiative for collaborating on this issue through the coordinated vulnerability disclosure process.
Please email [已去除邮箱] with any security questions or concerns.