Skip to content

Commit 378412b

Browse files
authored
Update aws-client-vpn-buffer-overflow
1 parent d947a62 commit 378412b

File tree

1 file changed

+18
-4
lines changed

1 file changed

+18
-4
lines changed

vulnerabilities/aws-client-vpn-buffer-overflow

Lines changed: 18 additions & 4 deletions
Original file line numberDiff line numberDiff line change
@@ -19,10 +19,24 @@ disclosedAt: 2024/07/16
1919
exploitabilityPeriod: null
2020
knownITWExploitation: false
2121
summary: |
22-
The AWS Client VPN service was found to be affected by two vulnerabilities which could potentially allow malicious actors with access to a user’s device to execute arbitrary commands with elevated privileges, including escalating to root access. Both vulnerabilities stem from buffer overflow issues, a common programming error that can be exploited to overwrite memory and gain unauthorized control over a system.
23-
The impact of these vulnerabilities is severe, as successful exploitation could lead to complete compromise of an affected device. Attackers could gain access to sensitive data, install malware, or disrupt system operations. Given the widespread use of AWS Client VPN for secure remote access, the potential for widespread exploitation is a significant concern.
24-
AWS has acted swiftly to address these vulnerabilities, releasing updated versions of the Client VPN software for all supported platforms. However, the onus is on users to promptly apply these updates to mitigate the risk.
25-
manualRemediation: Customers using AWS Client VPN should upgrade to version 3.11.1 or higher for Windows, 3.9.2 or higher for MacOS, and 3.12.1 or higher for Linux.
22+
The AWS Client VPN service was found to be affected by two
23+
vulnerabilities which could potentially allow malicious actors with access to
24+
a user’s device to execute arbitrary commands with elevated privileges,
25+
including escalating to root access. Both vulnerabilities stem from buffer
26+
overflow issues, a common programming error that can be exploited to overwrite
27+
memory and gain unauthorized control over a system. The impact of these
28+
vulnerabilities is severe, as successful exploitation could lead to complete
29+
compromise of an affected device. Attackers could gain access to sensitive
30+
data, install malware, or disrupt system operations. Given the widespread use
31+
of AWS Client VPN for secure remote access, the potential for widespread
32+
exploitation is a significant concern. AWS has acted swiftly to address these
33+
vulnerabilities, releasing updated versions of the Client VPN software for all
34+
supported platforms. However, the onus is on users to promptly apply these
35+
updates to mitigate the risk.
36+
manualRemediation: |
37+
Customers using AWS Client VPN should upgrade to version
38+
3.11.1 or higher for Windows, 3.9.2 or higher for MacOS, and 3.12.1 or higher
39+
for Linux.
2640
contributor: https://github.com/Mitalee09
2741
entryStatus: Finalized
2842
references:

0 commit comments

Comments
 (0)