CVE-2022-23567: n/a in n/a
Tensorflow is an Open Source Machine Learning Framework. The implementations of `Sparse*Cwise*` ops are vulnerable to integer overflows. These can be used to trigger large allocations (so, OOM based denial of service) or `CHECK`-fails when building new `TensorShape` objects (so, assert failures based denial of service). We are missing some validation on the shapes of the input tensors as well as directly constructing a large `TensorShape` with user-provided dimensions. The fix will be included in TensorFlow 2.8.0. We will also cherrypick this commit on TensorFlow 2.7.1, TensorFlow 2.6.3, and TensorFlow 2.5.3, as these are also affected and still in supported range.
AI Analysis
Technical Summary
CVE-2022-23567 is a medium-severity vulnerability affecting TensorFlow, an open-source machine learning framework widely used for developing and deploying machine learning models. The vulnerability arises from integer overflow issues in the implementations of the Sparse*Cwise* operations within TensorFlow. Specifically, the problem lies in insufficient validation of input tensor shapes and the direct construction of large TensorShape objects using user-provided dimensions. These integer overflows can lead to the allocation of excessively large memory buffers, resulting in out-of-memory (OOM) conditions that cause denial of service (DoS). Additionally, the vulnerability can trigger CHECK-failures (assertion failures) during TensorShape construction, also leading to DoS by crashing the application. The vulnerability affects multiple supported TensorFlow versions, including 2.5.3, 2.6.3, 2.7.1, and will be fixed in 2.8.0. The CVSS v3.1 base score is 6.5 (medium), with an attack vector of network (remote), low attack complexity, requiring low privileges but no user interaction, and impacting availability only. No known exploits are currently reported in the wild. The root cause is classified under CWE-190 (Integer Overflow or Wraparound). This vulnerability is significant because machine learning workloads often process untrusted or external data, and an attacker could craft malicious inputs to trigger these overflows, causing service interruptions or crashes in systems relying on TensorFlow for inference or training tasks.
Potential Impact
For European organizations, the impact of CVE-2022-23567 primarily concerns availability disruptions in machine learning services that utilize vulnerable TensorFlow versions. Organizations in sectors such as finance, healthcare, automotive, telecommunications, and research institutions that deploy TensorFlow-based models for critical applications could experience denial of service conditions, leading to downtime, degraded service quality, or interruption of automated decision-making processes. This could affect customer-facing services, internal analytics, or safety-critical systems relying on ML inference. While confidentiality and integrity are not directly impacted, the availability loss could have cascading operational and reputational consequences. Given the increasing adoption of AI/ML technologies across Europe, especially in countries with strong AI research and industrial sectors, the risk of disruption is non-negligible. However, exploitation requires the ability to supply crafted input tensors to the vulnerable operations, which may limit the attack surface to exposed ML inference endpoints or pipelines processing untrusted data.
Mitigation Recommendations
European organizations should promptly upgrade TensorFlow to version 2.8.0 or apply the backported patches available for versions 2.5.3, 2.6.3, and 2.7.1 to remediate the vulnerability. In addition to patching, organizations should implement strict input validation and sanitization on all tensor data received from external or untrusted sources to prevent malformed inputs that could trigger integer overflows. Deploying runtime monitoring to detect abnormal memory allocation patterns or frequent assertion failures in ML services can help identify exploitation attempts early. Where possible, restrict access to ML model endpoints through network segmentation, authentication, and authorization controls to reduce exposure. For critical systems, consider sandboxing TensorFlow execution environments to contain potential crashes or resource exhaustion. Finally, maintain an inventory of TensorFlow deployments and versions to ensure comprehensive coverage of patching efforts.
Affected Countries
Germany, France, United Kingdom, Netherlands, Sweden, Finland, Italy, Spain
CVE-2022-23567: n/a in n/a
Description
Tensorflow is an Open Source Machine Learning Framework. The implementations of `Sparse*Cwise*` ops are vulnerable to integer overflows. These can be used to trigger large allocations (so, OOM based denial of service) or `CHECK`-fails when building new `TensorShape` objects (so, assert failures based denial of service). We are missing some validation on the shapes of the input tensors as well as directly constructing a large `TensorShape` with user-provided dimensions. The fix will be included in TensorFlow 2.8.0. We will also cherrypick this commit on TensorFlow 2.7.1, TensorFlow 2.6.3, and TensorFlow 2.5.3, as these are also affected and still in supported range.
AI-Powered Analysis
Technical Analysis
CVE-2022-23567 is a medium-severity vulnerability affecting TensorFlow, an open-source machine learning framework widely used for developing and deploying machine learning models. The vulnerability arises from integer overflow issues in the implementations of the Sparse*Cwise* operations within TensorFlow. Specifically, the problem lies in insufficient validation of input tensor shapes and the direct construction of large TensorShape objects using user-provided dimensions. These integer overflows can lead to the allocation of excessively large memory buffers, resulting in out-of-memory (OOM) conditions that cause denial of service (DoS). Additionally, the vulnerability can trigger CHECK-failures (assertion failures) during TensorShape construction, also leading to DoS by crashing the application. The vulnerability affects multiple supported TensorFlow versions, including 2.5.3, 2.6.3, 2.7.1, and will be fixed in 2.8.0. The CVSS v3.1 base score is 6.5 (medium), with an attack vector of network (remote), low attack complexity, requiring low privileges but no user interaction, and impacting availability only. No known exploits are currently reported in the wild. The root cause is classified under CWE-190 (Integer Overflow or Wraparound). This vulnerability is significant because machine learning workloads often process untrusted or external data, and an attacker could craft malicious inputs to trigger these overflows, causing service interruptions or crashes in systems relying on TensorFlow for inference or training tasks.
Potential Impact
For European organizations, the impact of CVE-2022-23567 primarily concerns availability disruptions in machine learning services that utilize vulnerable TensorFlow versions. Organizations in sectors such as finance, healthcare, automotive, telecommunications, and research institutions that deploy TensorFlow-based models for critical applications could experience denial of service conditions, leading to downtime, degraded service quality, or interruption of automated decision-making processes. This could affect customer-facing services, internal analytics, or safety-critical systems relying on ML inference. While confidentiality and integrity are not directly impacted, the availability loss could have cascading operational and reputational consequences. Given the increasing adoption of AI/ML technologies across Europe, especially in countries with strong AI research and industrial sectors, the risk of disruption is non-negligible. However, exploitation requires the ability to supply crafted input tensors to the vulnerable operations, which may limit the attack surface to exposed ML inference endpoints or pipelines processing untrusted data.
Mitigation Recommendations
European organizations should promptly upgrade TensorFlow to version 2.8.0 or apply the backported patches available for versions 2.5.3, 2.6.3, and 2.7.1 to remediate the vulnerability. In addition to patching, organizations should implement strict input validation and sanitization on all tensor data received from external or untrusted sources to prevent malformed inputs that could trigger integer overflows. Deploying runtime monitoring to detect abnormal memory allocation patterns or frequent assertion failures in ML services can help identify exploitation attempts early. Where possible, restrict access to ML model endpoints through network segmentation, authentication, and authorization controls to reduce exposure. For critical systems, consider sandboxing TensorFlow execution environments to contain potential crashes or resource exhaustion. Finally, maintain an inventory of TensorFlow deployments and versions to ensure comprehensive coverage of patching efforts.
Affected Countries
Technical Details
- Data Version
- 5.1
- Assigner Short Name
- GitHub_M
- Date Reserved
- 2022-01-19T00:00:00.000Z
- Cisa Enriched
- true
- Cvss Version
- 3.1
- State
- PUBLISHED
Threat ID: 682d981ec4522896dcbdc01a
Added to database: 5/21/2025, 9:08:46 AM
Last enriched: 7/6/2025, 11:39:32 PM
Last updated: 2/3/2026, 1:26:50 AM
Views: 36
Community Reviews
0 reviewsCrowdsource mitigation strategies, share intel context, and vote on the most helpful responses. Sign in to add your voice and help keep defenders ahead.
Want to contribute mitigation steps or threat intel context? Sign in or create an account to join the community discussion.
Related Threats
CVE-2025-23239: CWE-77 Improper Neutralization of Special Elements used in a Command ('Command Injection') in F5 BIG-IP
HighCVE-2024-32761: CWE-119 Improper Restriction of Operations within the Bounds of a Memory Buffer in F5 BIG-IP
MediumCVE-2025-61650: CWE-79 Improper Neutralization of Input During Web Page Generation (XSS or 'Cross-site Scripting') in Wikimedia Foundation CheckUser
LowCVE-2025-61649: Vulnerability in Wikimedia Foundation CheckUser
LowCVE-2025-61646: Vulnerability in Wikimedia Foundation MediaWiki
LowActions
Updates to AI analysis require Pro Console access. Upgrade inside Console → Billing.
External Links
Need more coverage?
Upgrade to Pro Console in Console -> Billing for AI refresh and higher limits.
For incident response and remediation, OffSeq services can help resolve threats faster.