Skip to main content

CVE-2022-21734: n/a in n/a

Medium
VulnerabilityCVE-2022-21734cvecve-2022-21734
Published: Thu Feb 03 2022 (02/03/2022, 12:59:18 UTC)
Source: CVE
Vendor/Project: n/a
Product: n/a

Description

Tensorflow is an Open Source Machine Learning Framework. The implementation of `MapStage` is vulnerable a `CHECK`-fail if the key tensor is not a scalar. The fix will be included in TensorFlow 2.8.0. We will also cherrypick this commit on TensorFlow 2.7.1, TensorFlow 2.6.3, and TensorFlow 2.5.3, as these are also affected and still in supported range.

AI-Powered Analysis

AILast updated: 07/06/2025, 23:26:36 UTC

Technical Analysis

CVE-2022-21734 is a medium-severity vulnerability affecting TensorFlow, an open-source machine learning framework widely used for developing and deploying machine learning models. The vulnerability arises in the implementation of the MapStage component, where a CHECK-fail occurs if the key tensor provided is not a scalar. This means that if an input tensor used as a key in the MapStage operation is of an unexpected shape (non-scalar), the system triggers an internal assertion failure, causing the TensorFlow process to crash. This vulnerability is classified under CWE-843 (Access of Resource Using Incompatible Type or Version), indicating that improper input validation leads to a denial of service (DoS) condition. The issue affects multiple TensorFlow versions, including 2.5.3, 2.6.3, 2.7.1, and will be fixed in 2.8.0. The vulnerability has a CVSS v3.1 score of 6.5, reflecting a medium severity level, with an attack vector of network (AV:N), low attack complexity (AC:L), requiring privileges (PR:L), no user interaction (UI:N), unchanged scope (S:U), no impact on confidentiality or integrity (C:N/I:N), but high impact on availability (A:H). Exploitation would require an attacker to have some level of privileges on the system running TensorFlow, but no user interaction is needed. The vulnerability does not expose data or allow code execution but can cause denial of service by crashing the TensorFlow process when processing malformed input data. No known exploits are currently reported in the wild. The fix involves proper validation of the key tensor to ensure it is scalar before processing, preventing the CHECK-fail crash. This fix is backported to supported TensorFlow versions to mitigate the risk.

Potential Impact

For European organizations leveraging TensorFlow in production environments—such as research institutions, technology companies, financial services, healthcare, and manufacturing—the vulnerability poses a risk of denial of service. An attacker with limited privileges on a system running TensorFlow could craft inputs that cause the TensorFlow process to crash, potentially disrupting machine learning workflows, automated decision-making systems, or AI-driven services. This could lead to operational downtime, loss of availability of critical AI services, and delays in data processing pipelines. While the vulnerability does not compromise data confidentiality or integrity, the availability impact could affect business continuity, especially in sectors relying heavily on real-time or batch AI computations. Organizations using TensorFlow in cloud or containerized environments may face additional risks if the vulnerability is exploited to cause cascading failures or resource exhaustion. Given the widespread adoption of TensorFlow across Europe, the impact could be significant if unpatched systems are targeted, particularly in critical infrastructure sectors or industries with stringent uptime requirements.

Mitigation Recommendations

European organizations should promptly update TensorFlow to version 2.8.0 or apply the backported patches available for versions 2.5.3, 2.6.3, and 2.7.1. If immediate upgrading is not feasible, organizations should implement input validation controls at the application level to ensure that key tensors passed to MapStage operations are scalar, preventing malformed inputs from triggering the vulnerability. Additionally, deploying runtime monitoring and anomaly detection to identify unexpected TensorFlow crashes can help detect exploitation attempts early. Restricting access to TensorFlow services and limiting privileges to only trusted users and processes reduces the attack surface. Organizations should also review and harden their machine learning pipeline security, including sandboxing TensorFlow execution environments to contain potential crashes. Regularly auditing and updating dependencies in AI/ML projects is critical to maintaining security posture. Finally, integrating TensorFlow vulnerability checks into continuous integration/continuous deployment (CI/CD) pipelines can ensure timely patching and reduce exposure.

Need more detailed analysis?Get Pro

Technical Details

Data Version
5.1
Assigner Short Name
GitHub_M
Date Reserved
2021-11-16T00:00:00.000Z
Cisa Enriched
true
Cvss Version
3.1
State
PUBLISHED

Threat ID: 682d981ec4522896dcbdbee8

Added to database: 5/21/2025, 9:08:46 AM

Last enriched: 7/6/2025, 11:26:36 PM

Last updated: 8/13/2025, 12:48:53 AM

Views: 15

Actions

PRO

Updates to AI analysis are available only with a Pro account. Contact root@offseq.com for access.

Please log in to the Console to use AI analysis features.

Need enhanced features?

Contact root@offseq.com for Pro access with improved analysis and higher rate limits.

Latest Threats