Metrics
Affected Vendors & Products
Tue, 14 Oct 2025 18:00:00 +0000
Type | Values Removed | Values Added |
---|---|---|
References |
|
Wed, 23 Jul 2025 17:15:00 +0000
Type | Values Removed | Values Added |
---|---|---|
Metrics |
ssvc
|
Wed, 23 Jul 2025 16:00:00 +0000
Type | Values Removed | Values Added |
---|---|---|
Description | During the AWS Client VPN client installation on Windows devices, the install process references the C:\usr\local\windows-x86_64-openssl-localbuild\ssl directory location to fetch the OpenSSL configuration file. As a result, a non-admin user could place arbitrary code in the configuration file. If an admin user starts the AWS Client VPN client installation process, that code could be executed with root-level privileges. This issue does not affect Linux or Mac devices. We recommend users discontinue any new installations of AWS Client VPN on Windows prior to version 5.2.2. | |
Title | Local Privilege Escalation Vulnerability in AWS Client VPN Windows Client | |
Weaknesses | CWE-276 | |
References |
| |
Metrics |
cvssV3_1
|

Status: PUBLISHED
Assigner: AMZN
Published:
Updated: 2025-10-14T17:56:39.471Z
Reserved: 2025-07-22T23:35:20.181Z
Link: CVE-2025-8069

Updated: 2025-07-23T16:21:45.017Z

Status : Awaiting Analysis
Published: 2025-07-23T16:15:29.243
Modified: 2025-10-14T18:15:37.230
Link: CVE-2025-8069

No data.

No data.