CVE-2022-23567: n/a in n/a
Tensorflow is an Open Source Machine Learning Framework. The implementations of `Sparse*Cwise*` ops are vulnerable to integer overflows. These can be used to trigger large allocations (so, OOM based denial of service) or `CHECK`-fails when building new `TensorShape` objects (so, assert failures based denial of service). We are missing some validation on the shapes of the input tensors as well as directly constructing a large `TensorShape` with user-provided dimensions. The fix will be included in TensorFlow 2.8.0. We will also cherrypick this commit on TensorFlow 2.7.1, TensorFlow 2.6.3, and TensorFlow 2.5.3, as these are also affected and still in supported range.
AI Analysis
Technical Summary
CVE-2022-23567 is a medium-severity vulnerability affecting TensorFlow, an open-source machine learning framework widely used for developing and deploying machine learning models. The vulnerability arises from integer overflow issues in the implementations of the Sparse*Cwise* operations within TensorFlow. Specifically, the problem lies in insufficient validation of input tensor shapes and the direct construction of large TensorShape objects using user-provided dimensions. These integer overflows can lead to the allocation of excessively large memory buffers, resulting in out-of-memory (OOM) conditions that cause denial of service (DoS). Additionally, the vulnerability can trigger CHECK-failures (assertion failures) during TensorShape construction, also leading to DoS by crashing the application. The vulnerability affects multiple supported TensorFlow versions, including 2.5.3, 2.6.3, 2.7.1, and will be fixed in 2.8.0. The CVSS v3.1 base score is 6.5 (medium), with an attack vector of network (remote), low attack complexity, requiring low privileges but no user interaction, and impacting availability only. No known exploits are currently reported in the wild. The root cause is classified under CWE-190 (Integer Overflow or Wraparound). This vulnerability is significant because machine learning workloads often process untrusted or external data, and an attacker could craft malicious inputs to trigger these overflows, causing service interruptions or crashes in systems relying on TensorFlow for inference or training tasks.
Potential Impact
For European organizations, the impact of CVE-2022-23567 primarily concerns availability disruptions in machine learning services that utilize vulnerable TensorFlow versions. Organizations in sectors such as finance, healthcare, automotive, telecommunications, and research institutions that deploy TensorFlow-based models for critical applications could experience denial of service conditions, leading to downtime, degraded service quality, or interruption of automated decision-making processes. This could affect customer-facing services, internal analytics, or safety-critical systems relying on ML inference. While confidentiality and integrity are not directly impacted, the availability loss could have cascading operational and reputational consequences. Given the increasing adoption of AI/ML technologies across Europe, especially in countries with strong AI research and industrial sectors, the risk of disruption is non-negligible. However, exploitation requires the ability to supply crafted input tensors to the vulnerable operations, which may limit the attack surface to exposed ML inference endpoints or pipelines processing untrusted data.
Mitigation Recommendations
European organizations should promptly upgrade TensorFlow to version 2.8.0 or apply the backported patches available for versions 2.5.3, 2.6.3, and 2.7.1 to remediate the vulnerability. In addition to patching, organizations should implement strict input validation and sanitization on all tensor data received from external or untrusted sources to prevent malformed inputs that could trigger integer overflows. Deploying runtime monitoring to detect abnormal memory allocation patterns or frequent assertion failures in ML services can help identify exploitation attempts early. Where possible, restrict access to ML model endpoints through network segmentation, authentication, and authorization controls to reduce exposure. For critical systems, consider sandboxing TensorFlow execution environments to contain potential crashes or resource exhaustion. Finally, maintain an inventory of TensorFlow deployments and versions to ensure comprehensive coverage of patching efforts.
Affected Countries
Germany, France, United Kingdom, Netherlands, Sweden, Finland, Italy, Spain
CVE-2022-23567: n/a in n/a
Description
Tensorflow is an Open Source Machine Learning Framework. The implementations of `Sparse*Cwise*` ops are vulnerable to integer overflows. These can be used to trigger large allocations (so, OOM based denial of service) or `CHECK`-fails when building new `TensorShape` objects (so, assert failures based denial of service). We are missing some validation on the shapes of the input tensors as well as directly constructing a large `TensorShape` with user-provided dimensions. The fix will be included in TensorFlow 2.8.0. We will also cherrypick this commit on TensorFlow 2.7.1, TensorFlow 2.6.3, and TensorFlow 2.5.3, as these are also affected and still in supported range.
AI-Powered Analysis
Technical Analysis
CVE-2022-23567 is a medium-severity vulnerability affecting TensorFlow, an open-source machine learning framework widely used for developing and deploying machine learning models. The vulnerability arises from integer overflow issues in the implementations of the Sparse*Cwise* operations within TensorFlow. Specifically, the problem lies in insufficient validation of input tensor shapes and the direct construction of large TensorShape objects using user-provided dimensions. These integer overflows can lead to the allocation of excessively large memory buffers, resulting in out-of-memory (OOM) conditions that cause denial of service (DoS). Additionally, the vulnerability can trigger CHECK-failures (assertion failures) during TensorShape construction, also leading to DoS by crashing the application. The vulnerability affects multiple supported TensorFlow versions, including 2.5.3, 2.6.3, 2.7.1, and will be fixed in 2.8.0. The CVSS v3.1 base score is 6.5 (medium), with an attack vector of network (remote), low attack complexity, requiring low privileges but no user interaction, and impacting availability only. No known exploits are currently reported in the wild. The root cause is classified under CWE-190 (Integer Overflow or Wraparound). This vulnerability is significant because machine learning workloads often process untrusted or external data, and an attacker could craft malicious inputs to trigger these overflows, causing service interruptions or crashes in systems relying on TensorFlow for inference or training tasks.
Potential Impact
For European organizations, the impact of CVE-2022-23567 primarily concerns availability disruptions in machine learning services that utilize vulnerable TensorFlow versions. Organizations in sectors such as finance, healthcare, automotive, telecommunications, and research institutions that deploy TensorFlow-based models for critical applications could experience denial of service conditions, leading to downtime, degraded service quality, or interruption of automated decision-making processes. This could affect customer-facing services, internal analytics, or safety-critical systems relying on ML inference. While confidentiality and integrity are not directly impacted, the availability loss could have cascading operational and reputational consequences. Given the increasing adoption of AI/ML technologies across Europe, especially in countries with strong AI research and industrial sectors, the risk of disruption is non-negligible. However, exploitation requires the ability to supply crafted input tensors to the vulnerable operations, which may limit the attack surface to exposed ML inference endpoints or pipelines processing untrusted data.
Mitigation Recommendations
European organizations should promptly upgrade TensorFlow to version 2.8.0 or apply the backported patches available for versions 2.5.3, 2.6.3, and 2.7.1 to remediate the vulnerability. In addition to patching, organizations should implement strict input validation and sanitization on all tensor data received from external or untrusted sources to prevent malformed inputs that could trigger integer overflows. Deploying runtime monitoring to detect abnormal memory allocation patterns or frequent assertion failures in ML services can help identify exploitation attempts early. Where possible, restrict access to ML model endpoints through network segmentation, authentication, and authorization controls to reduce exposure. For critical systems, consider sandboxing TensorFlow execution environments to contain potential crashes or resource exhaustion. Finally, maintain an inventory of TensorFlow deployments and versions to ensure comprehensive coverage of patching efforts.
Affected Countries
For access to advanced analysis and higher rate limits, contact root@offseq.com
Technical Details
- Data Version
- 5.1
- Assigner Short Name
- GitHub_M
- Date Reserved
- 2022-01-19T00:00:00.000Z
- Cisa Enriched
- true
- Cvss Version
- 3.1
- State
- PUBLISHED
Threat ID: 682d981ec4522896dcbdc01a
Added to database: 5/21/2025, 9:08:46 AM
Last enriched: 7/6/2025, 11:39:32 PM
Last updated: 7/30/2025, 4:00:15 AM
Views: 12
Related Threats
CVE-2025-9019: Heap-based Buffer Overflow in tcpreplay
LowCVE-2025-9017: Cross Site Scripting in PHPGurukul Zoo Management System
MediumCVE-2025-9051: SQL Injection in projectworlds Travel Management System
MediumCVE-2025-1929: CWE-89 Improper Neutralization of Special Elements used in an SQL Command ('SQL Injection') in Risk Yazılım Teknolojileri Ltd. Şti. Reel Sektör Hazine ve Risk Yönetimi Yazılımı
HighCVE-2025-54475: CWE-89: Improper Neutralization of Special Elements used in an SQL Command in joomsky.com JS Jobs component for Joomla
HighActions
Updates to AI analysis are available only with a Pro account. Contact root@offseq.com for access.
External Links
Need enhanced features?
Contact root@offseq.com for Pro access with improved analysis and higher rate limits.