CVE-2025-11462: CWE-59 Improper Link Resolution Before File Access ('Link Following') in AWS Client VPN
Improper Link Resolution Before File Access in the AWS VPN Client for macOS versions 1.3.2- 5.2.0 allows a local user to execute code with elevated privileges. Insufficient validation checks on the log destination directory during log rotation could allow a non-administrator user to create a symlink from a client log file to a privileged location. On log rotation, this could lead to code execution with root privileges if the user made crafted API calls which injected arbitrary code into the log file. We recommend users upgrade to AWS VPN Client for macOS 5.2.1 or the latest version.
AI Analysis
Technical Summary
CVE-2025-11462 is a critical local privilege escalation vulnerability found in AWS Client VPN for macOS versions 1.3.2 through 5.2.0. The root cause is improper link resolution before file access, classified under CWE-59. Specifically, during log rotation, the software insufficiently validates the log destination directory, allowing a local non-administrator user to create a symbolic link (symlink) from a client log file to an arbitrary privileged location on the filesystem. When the VPN client performs log rotation, it follows this symlink and writes to the privileged location. If the attacker has injected malicious code into the log file via crafted API calls, this code can be executed with root privileges. This vulnerability does not require user interaction or elevated privileges initially, only local access, making it a potent vector for privilege escalation. The vulnerability affects the confidentiality, integrity, and availability of the system because an attacker can gain root-level code execution, potentially compromising the entire system. AWS has addressed this issue in version 5.2.1 of the VPN client for macOS. No public exploits have been reported yet, but the CVSS 4.0 base score of 9.3 (critical) reflects the severity and ease of exploitation once local access is obtained. The vulnerability is particularly relevant to organizations using AWS Client VPN on macOS endpoints, especially in environments where local user accounts are not tightly controlled.
Potential Impact
The impact of CVE-2025-11462 is severe for organizations using AWS Client VPN on macOS systems. An attacker with local access but without administrative privileges can escalate to root privileges, enabling full system compromise. This can lead to unauthorized access to sensitive data, installation of persistent malware, disruption of VPN services, and lateral movement within networks. The compromise of VPN client endpoints is particularly dangerous as it can undermine the security of the entire corporate network by exposing VPN credentials or session information. Additionally, root-level access allows attackers to disable security controls, hide their presence, and manipulate system logs, complicating incident response. Organizations relying on AWS Client VPN for secure remote access must consider this vulnerability a critical risk to endpoint security and overall network integrity.
Mitigation Recommendations
To mitigate CVE-2025-11462, organizations should immediately upgrade all macOS AWS Client VPN installations to version 5.2.1 or later, where the vulnerability is patched. Additionally, implement strict local user account management to limit the number of users with local access and monitor for suspicious symlink creation or unusual file system activity related to VPN client logs. Employ endpoint detection and response (EDR) solutions capable of detecting privilege escalation attempts and anomalous log file modifications. Regularly audit and harden macOS endpoint configurations to reduce the attack surface, including restricting write permissions on directories used by VPN clients. Consider deploying application whitelisting to prevent unauthorized code execution. Finally, educate users about the risks of local account misuse and enforce strong access controls on VPN client machines.
Affected Countries
United States, Canada, United Kingdom, Germany, Australia, Japan, France, Netherlands, India, Singapore
CVE-2025-11462: CWE-59 Improper Link Resolution Before File Access ('Link Following') in AWS Client VPN
Description
Improper Link Resolution Before File Access in the AWS VPN Client for macOS versions 1.3.2- 5.2.0 allows a local user to execute code with elevated privileges. Insufficient validation checks on the log destination directory during log rotation could allow a non-administrator user to create a symlink from a client log file to a privileged location. On log rotation, this could lead to code execution with root privileges if the user made crafted API calls which injected arbitrary code into the log file. We recommend users upgrade to AWS VPN Client for macOS 5.2.1 or the latest version.
AI-Powered Analysis
Machine-generated threat intelligence
Technical Analysis
CVE-2025-11462 is a critical local privilege escalation vulnerability found in AWS Client VPN for macOS versions 1.3.2 through 5.2.0. The root cause is improper link resolution before file access, classified under CWE-59. Specifically, during log rotation, the software insufficiently validates the log destination directory, allowing a local non-administrator user to create a symbolic link (symlink) from a client log file to an arbitrary privileged location on the filesystem. When the VPN client performs log rotation, it follows this symlink and writes to the privileged location. If the attacker has injected malicious code into the log file via crafted API calls, this code can be executed with root privileges. This vulnerability does not require user interaction or elevated privileges initially, only local access, making it a potent vector for privilege escalation. The vulnerability affects the confidentiality, integrity, and availability of the system because an attacker can gain root-level code execution, potentially compromising the entire system. AWS has addressed this issue in version 5.2.1 of the VPN client for macOS. No public exploits have been reported yet, but the CVSS 4.0 base score of 9.3 (critical) reflects the severity and ease of exploitation once local access is obtained. The vulnerability is particularly relevant to organizations using AWS Client VPN on macOS endpoints, especially in environments where local user accounts are not tightly controlled.
Potential Impact
The impact of CVE-2025-11462 is severe for organizations using AWS Client VPN on macOS systems. An attacker with local access but without administrative privileges can escalate to root privileges, enabling full system compromise. This can lead to unauthorized access to sensitive data, installation of persistent malware, disruption of VPN services, and lateral movement within networks. The compromise of VPN client endpoints is particularly dangerous as it can undermine the security of the entire corporate network by exposing VPN credentials or session information. Additionally, root-level access allows attackers to disable security controls, hide their presence, and manipulate system logs, complicating incident response. Organizations relying on AWS Client VPN for secure remote access must consider this vulnerability a critical risk to endpoint security and overall network integrity.
Mitigation Recommendations
To mitigate CVE-2025-11462, organizations should immediately upgrade all macOS AWS Client VPN installations to version 5.2.1 or later, where the vulnerability is patched. Additionally, implement strict local user account management to limit the number of users with local access and monitor for suspicious symlink creation or unusual file system activity related to VPN client logs. Employ endpoint detection and response (EDR) solutions capable of detecting privilege escalation attempts and anomalous log file modifications. Regularly audit and harden macOS endpoint configurations to reduce the attack surface, including restricting write permissions on directories used by VPN clients. Consider deploying application whitelisting to prevent unauthorized code execution. Finally, educate users about the risks of local account misuse and enforce strong access controls on VPN client machines.
Technical Details
- Data Version
- 5.1
- Assigner Short Name
- AMZN
- Date Reserved
- 2025-10-07T19:19:54.057Z
- Cvss Version
- 4.0
- State
- PUBLISHED
Threat ID: 68e57159a677756fc9a082f7
Added to database: 10/7/2025, 8:00:25 PM
Last enriched: 2/26/2026, 10:12:55 PM
Last updated: 3/22/2026, 1:27:34 PM
Views: 235
Community Reviews
0 reviewsCrowdsource mitigation strategies, share intel context, and vote on the most helpful responses. Sign in to add your voice and help keep defenders ahead.
Want to contribute mitigation steps or threat intel context? Sign in or create an account to join the community discussion.
Actions
Updates to AI analysis require Pro Console access. Upgrade inside Console → Billing.
Need more coverage?
Upgrade to Pro Console for AI refresh and higher limits.
For incident response and remediation, OffSeq services can help resolve threats faster.
Latest Threats
Check if your credentials are on the dark web
Instant breach scanning across billions of leaked records. Free tier available.