Description

Amazon Web Services (AWS) has disclosed a critical vulnerability in the macOS version of its Client VPN software, identified as CVE-2025-11462. The flaw, which exists in versions ranging from 1.3.2 to 5.2.0, stems from improper validation of the destination directory during the application's log rotation process. This oversight allows for a local privilege escalation scenario, where a non-administrative user with access to the system can exploit the weakness to gain root-level privileges. The attack method involves creating a symbolic link between the VPN client's log file and a sensitive system file—such as those used for task scheduling like crontab. When the application rotates logs, it writes data with elevated privileges, inadvertently overwriting or modifying critical system files. As a result, an attacker can execute arbitrary code as the root user. This vulnerability affects only macOS clients; users of the Windows and Linux versions of the VPN client are not impacted. Exploitation of this flaw could allow low-privileged users to escalate their access and gain full control over macOS devices. In environments that rely heavily on AWS VPN for secure connectivity, such compromised devices could serve as entry points for broader attacks—potentially leading to unauthorized access of internal systems or disruption of multi-tenant cloud setups. The simplicity of the exploit combined with its severe consequences has led to its classification as a critical vulnerability. AWS has resolved the issue in Client VPN Client version 5.2.1, and users are strongly encouraged to upgrade without delay. No alternative mitigations are currently available, making this update the sole reliable method of protection. Security teams should also audit logs for signs of privilege escalation and consider restricting local user capabilities on macOS devices until patches are deployed. Keeping systems updated and maintaining proactive monitoring remains essential to defending against emerging threats such as this.