We use these services and cookies to improve your user experience. You may opt out if you wish, however, this may limit some features on this site.

Please see our statement on Data Privacy.

Crisp.chat (Helpdesk and Chat)

Ok

THREATINT
PUBLISHED

CVE-2025-27496

Snowflake JDBC Driver client-side encryption key in DEBUG logs



Description

Snowflake, a platform for using artificial intelligence in the context of cloud computing, has a vulnerability in the Snowflake JDBC driver ("Driver") in versions 3.0.13 through 3.23.0 of the driver. When the logging level was set to DEBUG, the Driver would log locally the client-side encryption master key of the target stage during the execution of GET/PUT commands. This key by itself does not grant access to any sensitive data without additional access authorizations, and is not logged server-side by Snowflake. Snowflake fixed the issue in version 3.23.1.

Reserved 2025-02-26 | Published 2025-03-13 | Updated 2025-03-13 | Assigner GitHub_M


LOW: 3.3CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:L/I:N/A:N

Problem types

CWE-532: Insertion of Sensitive Information into Log File

Product status

>= 3.0.13, < 3.23.1
affected

References

github.com/...e-jdbc/security/advisories/GHSA-q298-375f-5q63

github.com/...ommit/ef81582ce2f1dbc3c8794a696c94f4fe65fad507

cve.org (CVE-2025-27496)

nvd.nist.gov (CVE-2025-27496)

Download JSON

Share this page
https://cve.threatint.com/CVE/CVE-2025-27496

Support options

Helpdesk Chat, Email, Knowledgebase