CVE-2025-8069

HIGH

AWS Client VPN - Code Injection

Title source: llm
STIX 2.1

Description

During the AWS Client VPN client installation on Windows devices, the install process references the C:\usr\local\windows-x86_64-openssl-localbuild\ssl directory location to fetch the OpenSSL configuration file. As a result, a non-admin user could place arbitrary code in the configuration file. If an admin user starts the AWS Client VPN client installation process, that code could be executed with root-level privileges. This issue does not affect Linux or Mac devices. We recommend users discontinue any new installations of AWS Client VPN on Windows prior to version 5.2.2.

Scores

CVSS v3 7.8
EPSS 0.0003
EPSS Percentile 6.8%
Attack Vector LOCAL
CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H

CISA SSVC

Vulnrichment
Exploitation none
Automatable no
Technical Impact total

Details

CWE
CWE-276
Status published
Products (2)
AWS/Client VPN 4.1.0
AWS/Client VPN 5.0.0 - 5.2.2
Published Jul 23, 2025
Tracked Since Feb 18, 2026