Skip to main content
Press slash or control plus K to focus the search. Use the arrow keys to navigate results and press enter to open a threat.
Reconnecting to live updates…

CVE-2025-11462: CWE-59 Improper Link Resolution Before File Access ('Link Following') in AWS Client VPN

0
Critical
VulnerabilityCVE-2025-11462cvecve-2025-11462cwe-59
Published: Tue Oct 07 2025 (10/07/2025, 19:44:25 UTC)
Source: CVE Database V5
Vendor/Project: AWS
Product: Client VPN

Description

Improper Link Resolution Before File Access in the AWS VPN Client for macOS versions 1.3.2- 5.2.0 allows a local user to execute code with elevated privileges. Insufficient validation checks on the log destination directory during log rotation could allow a non-administrator user to create a symlink from a client log file to a privileged location. On log rotation, this could lead to code execution with root privileges if the user made crafted API calls which injected arbitrary code into the log file. We recommend users upgrade to AWS VPN Client for macOS 5.2.1 or the latest version.

AI-Powered Analysis

Machine-generated threat intelligence

AILast updated: 02/26/2026, 22:12:55 UTC

Technical Analysis

CVE-2025-11462 is a critical local privilege escalation vulnerability found in AWS Client VPN for macOS versions 1.3.2 through 5.2.0. The root cause is improper link resolution before file access, classified under CWE-59. Specifically, during log rotation, the software insufficiently validates the log destination directory, allowing a local non-administrator user to create a symbolic link (symlink) from a client log file to an arbitrary privileged location on the filesystem. When the VPN client performs log rotation, it follows this symlink and writes to the privileged location. If the attacker has injected malicious code into the log file via crafted API calls, this code can be executed with root privileges. This vulnerability does not require user interaction or elevated privileges initially, only local access, making it a potent vector for privilege escalation. The vulnerability affects the confidentiality, integrity, and availability of the system because an attacker can gain root-level code execution, potentially compromising the entire system. AWS has addressed this issue in version 5.2.1 of the VPN client for macOS. No public exploits have been reported yet, but the CVSS 4.0 base score of 9.3 (critical) reflects the severity and ease of exploitation once local access is obtained. The vulnerability is particularly relevant to organizations using AWS Client VPN on macOS endpoints, especially in environments where local user accounts are not tightly controlled.

Potential Impact

The impact of CVE-2025-11462 is severe for organizations using AWS Client VPN on macOS systems. An attacker with local access but without administrative privileges can escalate to root privileges, enabling full system compromise. This can lead to unauthorized access to sensitive data, installation of persistent malware, disruption of VPN services, and lateral movement within networks. The compromise of VPN client endpoints is particularly dangerous as it can undermine the security of the entire corporate network by exposing VPN credentials or session information. Additionally, root-level access allows attackers to disable security controls, hide their presence, and manipulate system logs, complicating incident response. Organizations relying on AWS Client VPN for secure remote access must consider this vulnerability a critical risk to endpoint security and overall network integrity.

Mitigation Recommendations

To mitigate CVE-2025-11462, organizations should immediately upgrade all macOS AWS Client VPN installations to version 5.2.1 or later, where the vulnerability is patched. Additionally, implement strict local user account management to limit the number of users with local access and monitor for suspicious symlink creation or unusual file system activity related to VPN client logs. Employ endpoint detection and response (EDR) solutions capable of detecting privilege escalation attempts and anomalous log file modifications. Regularly audit and harden macOS endpoint configurations to reduce the attack surface, including restricting write permissions on directories used by VPN clients. Consider deploying application whitelisting to prevent unauthorized code execution. Finally, educate users about the risks of local account misuse and enforce strong access controls on VPN client machines.

Pro Console: star threats, build custom feeds, automate alerts via Slack, email & webhooks.Upgrade to Pro

Technical Details

Data Version
5.1
Assigner Short Name
AMZN
Date Reserved
2025-10-07T19:19:54.057Z
Cvss Version
4.0
State
PUBLISHED

Threat ID: 68e57159a677756fc9a082f7

Added to database: 10/7/2025, 8:00:25 PM

Last enriched: 2/26/2026, 10:12:55 PM

Last updated: 3/22/2026, 1:27:34 PM

Views: 235

Community Reviews

0 reviews

Crowdsource mitigation strategies, share intel context, and vote on the most helpful responses. Sign in to add your voice and help keep defenders ahead.

Sort by
Loading community insights…

Want to contribute mitigation steps or threat intel context? Sign in or create an account to join the community discussion.

Actions

PRO

Updates to AI analysis require Pro Console access. Upgrade inside Console → Billing.

Please log in to the Console to use AI analysis features.

Need more coverage?

Upgrade to Pro Console for AI refresh and higher limits.

For incident response and remediation, OffSeq services can help resolve threats faster.

Latest Threats

Breach by OffSeqOFFSEQFRIENDS — 25% OFF

Check if your credentials are on the dark web

Instant breach scanning across billions of leaked records. Free tier available.

Scan now
OffSeq TrainingCredly Certified

Lead Pen Test Professional

Technical5-day eLearningPECB Accredited
View courses