CVE-2025-11462
BaseFortify
Publication date: 2025-10-07
Last updated on: 2025-10-14
Assigner: AMZN
Description
Description
CVSS Scores
EPSS Scores
| Probability: | |
| Percentile: |
Meta Information
Affected Vendors & Products
| Vendor | Product | Version / Range |
|---|---|---|
| amazon | aws_client_vpn | 5.2.1 |
| amazon | aws_client_vpn | 1.3.2 |
| amazon | aws_client_vpn | 5.2.0 |
Helpful Resources
Exploitability
| CWE ID | Description |
|---|---|
| CWE-59 | The product attempts to access a file based on the filename, but it does not properly prevent that filename from identifying a link or shortcut that resolves to an unintended resource. |
Attack-Flow Graph
AI Powered Q&A
Can you explain this vulnerability to me?
This vulnerability is an improper link resolution issue in the AWS VPN Client for macOS versions 1.3.2 to 5.2.0. It allows a local user to execute code with elevated privileges by exploiting insufficient validation during log rotation. A non-administrator user can create a symbolic link from a client log file to a privileged location. When the log rotates, crafted API calls can inject arbitrary code into the log file, which then executes with root privileges.
How can this vulnerability impact me? :
This vulnerability can allow a local non-administrator user to execute arbitrary code with root privileges on a macOS system running the affected AWS VPN Client versions. This can lead to full system compromise, unauthorized access, and control over the affected machine.
What immediate steps should I take to mitigate this vulnerability?
Upgrade the AWS VPN Client for macOS to version 5.2.1 or the latest available version to address the improper link resolution vulnerability and prevent potential code execution with elevated privileges.