CVE-2023-51662

Source
https://nvd.nist.gov/vuln/detail/CVE-2023-51662
Import Source
https://storage.googleapis.com/cve-osv-conversion/osv-output/CVE-2023-51662.json
JSON Data
https://api.osv.dev/v1/vulns/CVE-2023-51662
Aliases
Published
2023-12-22T16:27:05.209Z
Modified
2025-12-05T00:13:41.270746Z
Severity
  • 6.0 (Medium) CVSS_V3 - CVSS:3.1/AV:A/AC:H/PR:H/UI:N/S:U/C:H/I:H/A:L CVSS Calculator
Summary
Snowflake Connector .NET does not properly check the Certificate Revocation List (CRL)
Details

The Snowflake .NET driver provides an interface to the Microsoft .NET open source software framework for developing applications. Snowflake recently received a report about a vulnerability in the Snowflake Connector .NET where the checks against the Certificate Revocation List (CRL) were not performed where the insecureMode flag was set to false, which is the default setting. The vulnerability affects versions between 2.0.25 and 2.1.4 (inclusive). Snowflake fixed the issue in version 2.1.5.

Database specific
{
    "cna_assigner": "GitHub_M",
    "cwe_ids": [
        "CWE-295"
    ],
    "osv_generated_from": "https://github.com/CVEProject/cvelistV5/tree/main/cves/2023/51xxx/CVE-2023-51662.json"
}
References

Affected packages

Git / github.com/snowflakedb/snowflake-connector-net

Affected ranges

Type
GIT
Repo
https://github.com/snowflakedb/snowflake-connector-net
Events

Affected versions

v2.*

v2.0.25
v2.1.0
v2.1.1
v2.1.2
v2.1.3
v2.1.4