Metrics
Affected Vendors & Products
Tue, 14 Oct 2025 18:00:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| References |
|
Wed, 23 Jul 2025 17:15:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| Metrics |
ssvc
|
Wed, 23 Jul 2025 16:00:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| Description | During the AWS Client VPN client installation on Windows devices, the install process references the C:\usr\local\windows-x86_64-openssl-localbuild\ssl directory location to fetch the OpenSSL configuration file. As a result, a non-admin user could place arbitrary code in the configuration file. If an admin user starts the AWS Client VPN client installation process, that code could be executed with root-level privileges. This issue does not affect Linux or Mac devices. We recommend users discontinue any new installations of AWS Client VPN on Windows prior to version 5.2.2. | |
| Title | Local Privilege Escalation Vulnerability in AWS Client VPN Windows Client | |
| Weaknesses | CWE-276 | |
| References |
| |
| Metrics |
cvssV3_1
|
Status: PUBLISHED
Assigner: AMZN
Published:
Updated: 2025-10-14T17:56:39.471Z
Reserved: 2025-07-22T23:35:20.181Z
Link: CVE-2025-8069
Updated: 2025-07-23T16:21:45.017Z
Status : Awaiting Analysis
Published: 2025-07-23T16:15:29.243
Modified: 2025-10-14T18:15:37.230
Link: CVE-2025-8069
No data.
OpenCVE Enrichment
No data.