CVE-2024-0056:
Microsoft.Data.SqlClient and System.Data.SqlClient vulnerable to SQL Data Provider Security Feature Bypass
8.7
Basic Information
Technical Details
Package Name | Ecosystem | Vulnerable Versions | First Patched Version |
---|---|---|---|
Microsoft.Data.SqlClient | nuget | < 2.1.7 | 2.1.7 |
System.Data.SqlClient | nuget | < 4.8.6 | 4.8.6 |
Microsoft.Data.SqlClient | nuget | >= 3.0.0, < 3.1.5 | 3.1.5 |
Microsoft.Data.SqlClient | nuget | >= 4.0.0, < 4.0.5 | 4.0.5 |
Microsoft.Data.SqlClient | nuget | >= 5.0.0, < 5.1.3 | 5.1.3 |
Vulnerability Intelligence
Miggo AI
Root Cause Analysis
The provided advisories describe a security feature bypass related to improper certificate validation
during encrypted connections, but they do not explicitly name specific vulnerable functions
or provide code/commit diffs. While the vulnerability likely exists in TLS
handshake and certificate validation
logic (potentially in connection initialization methods like SqlConnection.Open
), the lack of technical implementation details in public disclosures makes it impossible to identify exact function
names with high confidence. The CWE-319
classification suggests sensitive data exposure via unvalidated encrypted channels, but this manifests at the protocol implementation level rather than specific identifiable functions
without deeper code analysis.