Amazon Web Services (AWS) published a critical security vulnerability (CVE-2025-8069) in its Client VPN application for Windows that potentially enables non-administrative users to privilege-escalate to root-level privileges during installation. The application is susceptible to a vulnerability due to its practice of loading the OpenSSL configuration file from a hardcoded directory path: C:\usr\local\windows-x86_64-openssl-localbuild\ssl. This design vulnerability allows attackers to place malicious code inside the configuration file, which is run under elevated privileges when an administrator installs the VPN client. This security weakness only applies to the Windows version of the AWS Client VPN and not the Linux or macOS versions. The weakness is an important threat because it provides an avenue for non-admin users to gain access to the entire system. The weakness has been eliminated with the release of AWS Client VPN software version 5.2.2. The firm urges users to discontinue all new deployments of the older versions on Windows forthwith and upgrade to the most recent patched version available. As of today, AWS has not released any workaround for the impacted versions. Therefore, in this situation, the software patch appears to be the only possible mitigation. Organizations should update their AWS Client VPN installations to prevent exploitation, especially if several users operate Windows systems within environments. The vulnerability was discovered in collaboration with the Zero Day Initiative and responsibly disclosed, allowing AWS to update the vulnerability before public disclosure. This future-proofing minimized exposure to potential attacks. Organizations employing AWS Client VPN for secure access to cloud and on-premises should act swiftly to review current installations and implement the required updates to safeguard security integrity.
A Chinese state-sponsored advanced persistent threat (APT) group has been linked to the compromise of a military organization based in the Philippines through the deployment of a n...
Cybersecurity experts have detected two new malware families: CHILLYHELL, a macOS backdoor with modularity, and ZynorRAT, a remote access trojan using Go for Windows and Linux syst...
Siemens has issued a critical security advisory regarding a newly discovered vulnerability in its SIMATIC Virtualization as a Service (SIVaaS) platform. Tracked as CVE-2025-40804, ...