CVE-2025-8069 – AWS Client VPN Windows OpenSSL Configuration File Execution

The following table lists the changes that have been made to the
CVE-2025-8069 vulnerability over time.

Vulnerability history details can be useful for understanding the evolution
of a vulnerability, and for identifying the most recent changes that may
impact the vulnerability’s severity, exploitability, or other characteristics.

  • New CVE Received
    by ff89ba41-3aa1-4d27-914a-91399e9639e5

    Jul. 23, 2025

    Action Type Old Value New Value
    Added Description During the AWS Client VPN client installation on Windows devices, the install process references the C:usrlocalwindows-x86_64-openssl-localbuildssl directory location to fetch the OpenSSL configuration file. As a result, a non-admin user could place arbitrary code in the configuration file. If an admin user starts the AWS Client VPN client installation process, that code could be executed with root-level privileges. This issue does not affect Linux or Mac devices.

    We recommend users discontinue any new installations of AWS Client VPN on Windows prior to version 5.2.2.

    Added CVSS V4.0 AV:L/AC:L/AT:P/PR:L/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N/E:X/CR:X/IR:X/AR:X/MAV:X/MAC:X/MAT:X/MPR:X/MUI:X/MVC:X/MVI:X/MVA:X/MSC:X/MSI:X/MSA:X/S:X/AU:X/R:X/V:X/RE:X/U:X
    Added CVSS V3.1 AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H
    Added CWE CWE-276
    Added Reference https://aws.amazon.com/security/security-bulletins/AWS-2025-014/
Share the Post:

Related Posts