During the AWS Client VPN client installation on Windows devices, the install process references the C:\usr\local\windows-x86_64-openssl-localbuild\ssl directory location to fetch the OpenSSL configuration file. As a result, a non-admin user could place arbitrary code in the configuration file. If an admin user starts the AWS Client VPN client installation process, that code could be executed with root-level privileges. This issue does not affect Linux or Mac devices.
We recommend users discontinue any new installations of AWS Client VPN on Windows prior to version 5.2.2.
Metrics
Affected Vendors & Products
References
History
Wed, 23 Jul 2025 17:15:00 +0000
Type | Values Removed | Values Added |
---|---|---|
Metrics |
ssvc
|
Wed, 23 Jul 2025 16:00:00 +0000
Type | Values Removed | Values Added |
---|---|---|
Description | During the AWS Client VPN client installation on Windows devices, the install process references the C:\usr\local\windows-x86_64-openssl-localbuild\ssl directory location to fetch the OpenSSL configuration file. As a result, a non-admin user could place arbitrary code in the configuration file. If an admin user starts the AWS Client VPN client installation process, that code could be executed with root-level privileges. This issue does not affect Linux or Mac devices. We recommend users discontinue any new installations of AWS Client VPN on Windows prior to version 5.2.2. | |
Title | Local Privilege Escalation Vulnerability in AWS Client VPN Windows Client | |
Weaknesses | CWE-276 | |
References |
| |
Metrics |
cvssV3_1
|

Status: PUBLISHED
Assigner: AMZN
Published: 2025-07-23T15:41:40.310Z
Updated: 2025-07-23T16:21:48.305Z
Reserved: 2025-07-22T23:35:20.181Z
Link: CVE-2025-8069

Updated: 2025-07-23T16:21:45.017Z

Status : Awaiting Analysis
Published: 2025-07-23T16:15:29.243
Modified: 2025-07-25T15:29:44.523
Link: CVE-2025-8069

No data.