{"resultsPerPage":1,"startIndex":0,"totalResults":1,"format":"NVD_CVE","version":"2.0","timestamp":"2026-04-19T07:17:48.187","vulnerabilities":[{"cve":{"id":"CVE-2025-24794","sourceIdentifier":"security-advisories@github.com","published":"2025-01-29T21:15:21.397","lastModified":"2025-08-25T18:09:53.457","vulnStatus":"Analyzed","cveTags":[],"descriptions":[{"lang":"en","value":"The Snowflake Connector for Python provides an interface for developing Python applications that can connect to Snowflake and perform all standard operations. Snowflake discovered and remediated a vulnerability in the Snowflake Connector for Python. The OCSP response cache uses pickle as the serialization format, potentially leading to local privilege escalation. This vulnerability affects versions 2.7.12 through 3.13.0. Snowflake fixed the issue in version 3.13.1."},{"lang":"es","value":"Snowflake Connector para Python proporciona una interfaz para desarrollar aplicaciones Python que se pueden conectar a Snowflake y realizar todas las operaciones estándar. Snowflake descubrió y solucionó una vulnerabilidad en el conector Snowflake para Python. La caché de respuesta de OCSP utiliza pickle como formato de serialización, lo que puede provocar una escalada de privilegios locales. Esta vulnerabilidad afecta a las versiones 2.7.12 a 3.13.0. Snowflake solucionó el problema en la versión 3.13.1."}],"metrics":{"cvssMetricV31":[{"source":"security-advisories@github.com","type":"Secondary","cvssData":{"version":"3.1","vectorString":"CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H","baseScore":6.7,"baseSeverity":"MEDIUM","attackVector":"LOCAL","attackComplexity":"LOW","privilegesRequired":"HIGH","userInteraction":"NONE","scope":"UNCHANGED","confidentialityImpact":"HIGH","integrityImpact":"HIGH","availabilityImpact":"HIGH"},"exploitabilityScore":0.8,"impactScore":5.9},{"source":"nvd@nist.gov","type":"Primary","cvssData":{"version":"3.1","vectorString":"CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H","baseScore":7.8,"baseSeverity":"HIGH","attackVector":"LOCAL","attackComplexity":"LOW","privilegesRequired":"LOW","userInteraction":"NONE","scope":"UNCHANGED","confidentialityImpact":"HIGH","integrityImpact":"HIGH","availabilityImpact":"HIGH"},"exploitabilityScore":1.8,"impactScore":5.9}]},"weaknesses":[{"source":"security-advisories@github.com","type":"Secondary","description":[{"lang":"en","value":"CWE-502"}]}],"configurations":[{"nodes":[{"operator":"OR","negate":false,"cpeMatch":[{"vulnerable":true,"criteria":"cpe:2.3:a:snowflake:snowflake_connector:*:*:*:*:*:python:*:*","versionStartIncluding":"2.7.12","versionEndExcluding":"3.13.1","matchCriteriaId":"A59175C4-68F8-4C6C-8B9D-A9841FC9E066"}]}]}],"references":[{"url":"https://github.com/snowflakedb/snowflake-connector-python/commit/3769b43822357c3874c40f5e74068458c2dc79af","source":"security-advisories@github.com","tags":["Patch"]},{"url":"https://github.com/snowflakedb/snowflake-connector-python/security/advisories/GHSA-m4f6-vcj4-w5mx","source":"security-advisories@github.com","tags":["Vendor Advisory"]}]}}]}