Skip to main content

CVE-2025-8069 - AWS Client VPN Windows Client Local Privilege Escalation

Scope: AWS
Content Type: Important (requires attention)
Publication Date: 2025/07/23 8:30 AM PDT

Description:

AWS Client VPN is a managed client-based VPN service that enables secure access to AWS and on-premises resources. The AWS Client VPN client software runs on end-user devices, supporting Windows, macOS, and Linux and provides the ability for end users to establish a secure tunnel to the AWS Client VPN Service.

We identified CVE-2025-8069, an issue in AWS Client VPN. During the AWS Client VPN client installation on Windows devices, the install process references the C:\usr\local\windows-x86_64-openssl-localbuild\ssl directory location to fetch the OpenSSL configuration file. As a result, a non-admin user could place arbitrary code in the configuration file. If an admin user starts the AWS Client VPN client installation process, that code could be executed with root-level privileges. This issue does not affect Linux or Mac devices.

Affected version: 4.1.0, 5.0.0, 5.0.1, 5.0.2, 5.1.0, 5.2.0, 5.2.1

Resolution:

This issue has been addressed in AWS Client VPN Client version 5.2.2. We recommend users discontinue any new installations of AWS Client VPN on Windows prior to version 5.2.2.

Workaround:

N/A

References:

Acknowledgement:

We would like to thank Zero Day Initiative for collaborating on this issue through the coordinated vulnerability disclosure process.

Please email aws-security@amazon.com with any security questions or concerns.