CVE-2025-24788

5.0 MEDIUM

📋 TL;DR

The Snowflake Connector for .NET versions 2.0.12 through 4.2.0 on Linux and macOS temporarily store downloaded stage files in world-readable directories, allowing unauthorized local users on the same machine to access sensitive data. This affects organizations using the vulnerable connector for Snowflake data operations.

💻 Affected Systems

Products:
  • snowflake-connector-net
Versions: 2.0.12 through 4.2.0
Operating Systems: Linux, macOS
Default Config Vulnerable: ⚠️ Yes
Notes: Windows systems are not affected. Only impacts file downloads from Snowflake stages.

📦 What is this software?

⚠️ Risk & Real-World Impact

🔴

Worst Case

Sensitive data from Snowflake stages (including PII, financial records, or intellectual property) is exposed to unauthorized local users, leading to data breaches and compliance violations.

🟠

Likely Case

Unauthorized local users can read temporary files containing sensitive data during the brief window they exist, potentially exposing confidential information.

🟢

If Mitigated

With proper access controls and patching, only authorized processes can access temporary files, preventing data exposure.

🌐 Internet-Facing: LOW - This is a local file permission issue requiring local machine access.
🏢 Internal Only: MEDIUM - Multi-user systems or shared environments where local users could access temporary files are at risk.

🎯 Exploit Status

Public PoC: ✅ No
Weaponized: NO
Unauthenticated Exploit: ✅ No
Complexity: LOW

Exploitation requires local access to the machine running the vulnerable connector and knowledge of temporary file locations.

🛠️ Fix & Mitigation

✅ Official Fix

Patch Version: 4.3.0

Vendor Advisory: https://github.com/snowflakedb/snowflake-connector-net/security/advisories/GHSA-2mqw-rq5m-8hc8

Restart Required: No

Instructions:

1. Update snowflake-connector-net package to version 4.3.0 or later. 2. For .NET projects: Update NuGet package reference. 3. For standalone installations: Replace the connector binary with patched version.

🔧 Temporary Workarounds

Set secure temporary directory permissions

linux

Manually configure temporary directory with restrictive permissions before connector usage

mkdir -p /secure/temp/dir
chmod 700 /secure/temp/dir
export TMPDIR=/secure/temp/dir

🧯 If You Can't Patch

  • Restrict local user access to machines running the vulnerable connector
  • Monitor temporary directories for unauthorized access attempts

🔍 How to Verify

Check if Vulnerable:

Check installed snowflake-connector-net version. If between 2.0.12 and 4.2.0 on Linux/macOS, system is vulnerable.

Check Version:

dotnet list package | grep snowflake-connector-net OR check package manifest for version

Verify Fix Applied:

Verify version is 4.3.0 or later and test that temporary files created during stage downloads have restrictive permissions.

📡 Detection & Monitoring

Log Indicators:

  • Multiple failed file access attempts to temporary directories
  • Unexpected file reads from Snowflake connector temporary locations

Network Indicators:

  • Unusual data exfiltration patterns from systems running the connector

SIEM Query:

source="system_logs" AND (event="file_access" OR event="permission_denied") AND path CONTAINS "/tmp/" AND process="snowflake-connector"

🔗 References

📤 Share & Export