Skip to content

AWS Security Advisory for Flaws in AWS Client VPN - 20240723001

Overview

The WA SOC has been made aware of a security vulnerability detected in AWS Client VPN that could potentially allow malicious actors with access to a user’s device to execute arbitrary commands with elevated privileges, including escalating to root privilege. The vulnerabilities stem from buffer overflow issues, a common programming error that can be exploited to overwrite memory and gain unauthorized control over a system.

What is vulnerable?

Product(s) Affected Version(s) CVE CVSS Severity
AWS Client VPN versions below 3.11.1 for Windows
versions below 3.9.2 for MacOS
versions below 3.12.1 Linux
CVE-2024-30164
CVE-2024-30165
6.7
7.1
Medium
High

Recommendation

The WA SOC recommends administrators apply the solutions as per vendor instructions to all affected devices within expected timeframe of 1 month (refer Patch Management):

Reference