Skip to main content
DashboardThreatsMapFeedsAPI
reconnecting
Press slash or control plus K to focus the search. Use the arrow keys to navigate results and press enter to open a threat.
Reconnecting to live updates…

CVE-2025-11462: CWE-59 Improper Link Resolution Before File Access ('Link Following') in AWS Client VPN

0
Critical
VulnerabilityCVE-2025-11462cvecve-2025-11462cwe-59
Published: Tue Oct 07 2025 (10/07/2025, 19:44:25 UTC)
Source: CVE Database V5
Vendor/Project: AWS
Product: Client VPN

Description

Improper Link Resolution Before File Access in the AWS VPN Client for macOS versions 1.3.2- 5.2.0 allows a local user to execute code with elevated privileges. Insufficient validation checks on the log destination directory during log rotation could allow a non-administrator user to create a symlink from a client log file to a privileged location. On log rotation, this could lead to code execution with root privileges if the user made crafted API calls which injected arbitrary code into the log file. We recommend users upgrade to AWS VPN Client for macOS 5.2.1 or the latest version.

AI-Powered Analysis

AILast updated: 10/07/2025, 20:15:37 UTC

Technical Analysis

CVE-2025-11462 is a critical security vulnerability classified under CWE-59 (Improper Link Resolution Before File Access) affecting the AWS Client VPN software on macOS versions 1.3.2 through 5.2.0. The flaw arises from insufficient validation of the log destination directory during the log rotation process. Specifically, a local non-administrator user can create a symbolic link (symlink) from the client log file to a privileged system location. During log rotation, the VPN client writes logs to this symlinked location without verifying the link's target, which can be exploited to overwrite or inject arbitrary code into privileged files. If the attacker crafts API calls that inject malicious code into the log content, the log rotation process executes this code with root privileges, effectively allowing local privilege escalation. The vulnerability requires local access but no elevated privileges or user interaction, making it easier to exploit in environments where multiple users share a macOS system. AWS has addressed this vulnerability in version 5.2.1 of the Client VPN for macOS. The CVSS 4.0 vector (AV:L/AC:L/AT:N/PR:L/UI:N/VC:H/VI:H/VA:H/SC:H/SI:H/SA:H) reflects a local attack vector with low complexity, no authentication required, and high impact on confidentiality, integrity, and availability. There are no known exploits in the wild yet, but the critical severity and ease of exploitation warrant immediate attention.

Potential Impact

For European organizations, this vulnerability poses a significant risk of local privilege escalation on macOS systems running AWS Client VPN. Organizations with shared macOS environments or users with local access could see attackers gain root-level control, potentially leading to full system compromise, data theft, or disruption of VPN services. This could undermine the confidentiality and integrity of sensitive corporate communications and data accessed via the VPN. The elevated privileges could also allow attackers to disable security controls, install persistent malware, or pivot to other network resources. Given the widespread adoption of AWS services and VPNs for secure remote access in Europe, especially in sectors like finance, government, and technology, the impact could be severe if exploited. The vulnerability also threatens availability by potentially disrupting VPN connectivity through malicious log file manipulation.

Mitigation Recommendations

European organizations should immediately upgrade all AWS Client VPN for macOS installations to version 5.2.1 or later to patch this vulnerability. In addition, restrict local user permissions on macOS systems to prevent unauthorized creation of symbolic links in VPN log directories. Implement monitoring for unusual file system changes or log rotation activities that could indicate exploitation attempts. Employ endpoint protection solutions capable of detecting privilege escalation attempts and anomalous process behaviors. Consider isolating VPN client usage to dedicated user accounts with minimal privileges and enforce strict access controls on macOS devices. Regularly audit local user accounts and remove unnecessary privileges. Finally, educate IT staff and users about the risks of local access vulnerabilities and the importance of timely patching.

Need more detailed analysis?Get Pro

Technical Details

Data Version
5.1
Assigner Short Name
AMZN
Date Reserved
2025-10-07T19:19:54.057Z
Cvss Version
4.0
State
PUBLISHED

Threat ID: 68e57159a677756fc9a082f7

Added to database: 10/7/2025, 8:00:25 PM

Last enriched: 10/7/2025, 8:15:37 PM

Last updated: 10/9/2025, 3:14:04 PM

Views: 69

Community Reviews

0 reviews

Crowdsource mitigation strategies, share intel context, and vote on the most helpful responses. Sign in to add your voice and help keep defenders ahead.

Sort by
Loading community insights…

Want to contribute mitigation steps or threat intel context? Sign in or create an account to join the community discussion.

Actions

PRO

Updates to AI analysis are available only with a Pro account. Contact root@offseq.com for access.

Please log in to the Console to use AI analysis features.

Need enhanced features?

Contact root@offseq.com for Pro access with improved analysis and higher rate limits.

Latest Threats