CVE-2025-11462
Unknown Unknown - Not Provided
BaseFortify

Publication date: 2025-10-07

Last updated on: 2025-10-14

Assigner: AMZN

Description
Improper Link Resolution Before File Access in the AWS VPN Client for macOS versions 1.3.2- 5.2.0 allows a local user to execute code with elevated privileges. Insufficient validation checks on the log destination directory during log rotation could allow a non-administrator user to create a symlink from a client log file to a privileged location. On log rotation, this could lead to code execution with root privileges if the user made crafted API calls which injected arbitrary code into the log file. We recommend users upgrade to AWS VPN Client for macOS 5.2.1 or the latest version.
CVSS Scores
EPSS Scores
Probability:
Percentile:
Meta Information
Published
2025-10-07
Last Modified
2025-10-14
Generated
2026-05-07
AI Q&A
2025-10-07
EPSS Evaluated
2026-05-05
NVD
Affected Vendors & Products
Showing 3 associated CPEs
Vendor Product Version / Range
amazon aws_client_vpn 5.2.1
amazon aws_client_vpn 1.3.2
amazon aws_client_vpn 5.2.0
Helpful Resources
Exploitability
CWE
CWE Icon
KEV
KEV Icon
CWE ID Description
CWE-59 The product attempts to access a file based on the filename, but it does not properly prevent that filename from identifying a link or shortcut that resolves to an unintended resource.
Attack-Flow Graph
AI Powered Q&A
Can you explain this vulnerability to me?

This vulnerability is an improper link resolution issue in the AWS VPN Client for macOS versions 1.3.2 to 5.2.0. It allows a local user to execute code with elevated privileges by exploiting insufficient validation during log rotation. A non-administrator user can create a symbolic link from a client log file to a privileged location. When the log rotates, crafted API calls can inject arbitrary code into the log file, which then executes with root privileges.


How can this vulnerability impact me? :

This vulnerability can allow a local non-administrator user to execute arbitrary code with root privileges on a macOS system running the affected AWS VPN Client versions. This can lead to full system compromise, unauthorized access, and control over the affected machine.


What immediate steps should I take to mitigate this vulnerability?

Upgrade the AWS VPN Client for macOS to version 5.2.1 or the latest available version to address the improper link resolution vulnerability and prevent potential code execution with elevated privileges.


Ask Our AI Assistant
Need more information? Ask your question to get an AI reply (Powered by our expertise)
0/70
EPSS Chart