CVE-2022-23568: n/a in n/a
Tensorflow is an Open Source Machine Learning Framework. The implementation of `AddManySparseToTensorsMap` is vulnerable to an integer overflow which results in a `CHECK`-fail when building new `TensorShape` objects (so, an assert failure based denial of service). We are missing some validation on the shapes of the input tensors as well as directly constructing a large `TensorShape` with user-provided dimensions. The fix will be included in TensorFlow 2.8.0. We will also cherrypick this commit on TensorFlow 2.7.1, TensorFlow 2.6.3, and TensorFlow 2.5.3, as these are also affected and still in supported range.
AI Analysis
Technical Summary
CVE-2022-23568 is a medium-severity vulnerability affecting TensorFlow, an open-source machine learning framework widely used for developing and deploying machine learning models. The vulnerability arises from an integer overflow in the implementation of the function AddManySparseToTensorsMap. Specifically, this function improperly handles the construction of TensorShape objects by failing to validate the dimensions of input tensors adequately. When user-provided dimensions are used to build a large TensorShape, the integer overflow leads to a CHECK-fail, which is an assert failure within TensorFlow's internal checks. This failure results in a denial of service (DoS) condition, as the process crashes or terminates unexpectedly when attempting to build these TensorShape objects. The vulnerability does not affect confidentiality or integrity but impacts availability by causing service disruption. The affected TensorFlow versions include 2.5.3, 2.6.3, 2.7.1, and the fix is included in version 2.8.0. The vulnerability has a CVSS v3.1 base score of 6.5, reflecting a network attack vector with low attack complexity, requiring privileges but no user interaction, and causing high impact on availability only. There are no known exploits in the wild at this time. The root cause is classified under CWE-190 (Integer Overflow or Wraparound).
Potential Impact
For European organizations, the impact of CVE-2022-23568 primarily concerns the availability of machine learning services and applications that rely on vulnerable TensorFlow versions. Organizations using TensorFlow in production environments for critical applications—such as financial services, healthcare, manufacturing, or public sector AI initiatives—may experience service interruptions if an attacker with appropriate privileges exploits this vulnerability. Although exploitation requires some level of privilege (e.g., the ability to submit or manipulate machine learning jobs), the resulting denial of service could disrupt automated decision-making systems, data processing pipelines, or AI-driven services. This disruption could lead to operational delays, loss of productivity, or degraded service quality. Since TensorFlow is widely used across industries in Europe, the vulnerability poses a moderate risk, especially in environments where TensorFlow is exposed to multiple users or integrated into multi-tenant platforms. However, the lack of confidentiality or integrity impact limits the severity to availability concerns only.
Mitigation Recommendations
European organizations should take the following specific mitigation steps: 1) Identify all instances of TensorFlow in their environments, including development, testing, and production systems. 2) Prioritize upgrading TensorFlow to version 2.8.0 or later, or apply backported patches available for versions 2.5.3, 2.6.3, and 2.7.1, to remediate the vulnerability. 3) Implement strict input validation and sanitization for any user-provided tensor dimensions or data that interact with TensorFlow APIs, reducing the risk of triggering the integer overflow. 4) Restrict privileges for users or processes that can submit or modify machine learning jobs to minimize the attack surface. 5) Monitor TensorFlow application logs and system stability to detect unusual crashes or denial of service symptoms potentially linked to this vulnerability. 6) For multi-tenant or cloud environments, isolate TensorFlow workloads per tenant to prevent cross-tenant impact. 7) Incorporate vulnerability scanning and patch management processes specifically for machine learning frameworks to ensure timely updates.
Affected Countries
Germany, France, United Kingdom, Netherlands, Sweden, Finland, Denmark, Ireland
CVE-2022-23568: n/a in n/a
Description
Tensorflow is an Open Source Machine Learning Framework. The implementation of `AddManySparseToTensorsMap` is vulnerable to an integer overflow which results in a `CHECK`-fail when building new `TensorShape` objects (so, an assert failure based denial of service). We are missing some validation on the shapes of the input tensors as well as directly constructing a large `TensorShape` with user-provided dimensions. The fix will be included in TensorFlow 2.8.0. We will also cherrypick this commit on TensorFlow 2.7.1, TensorFlow 2.6.3, and TensorFlow 2.5.3, as these are also affected and still in supported range.
AI-Powered Analysis
Technical Analysis
CVE-2022-23568 is a medium-severity vulnerability affecting TensorFlow, an open-source machine learning framework widely used for developing and deploying machine learning models. The vulnerability arises from an integer overflow in the implementation of the function AddManySparseToTensorsMap. Specifically, this function improperly handles the construction of TensorShape objects by failing to validate the dimensions of input tensors adequately. When user-provided dimensions are used to build a large TensorShape, the integer overflow leads to a CHECK-fail, which is an assert failure within TensorFlow's internal checks. This failure results in a denial of service (DoS) condition, as the process crashes or terminates unexpectedly when attempting to build these TensorShape objects. The vulnerability does not affect confidentiality or integrity but impacts availability by causing service disruption. The affected TensorFlow versions include 2.5.3, 2.6.3, 2.7.1, and the fix is included in version 2.8.0. The vulnerability has a CVSS v3.1 base score of 6.5, reflecting a network attack vector with low attack complexity, requiring privileges but no user interaction, and causing high impact on availability only. There are no known exploits in the wild at this time. The root cause is classified under CWE-190 (Integer Overflow or Wraparound).
Potential Impact
For European organizations, the impact of CVE-2022-23568 primarily concerns the availability of machine learning services and applications that rely on vulnerable TensorFlow versions. Organizations using TensorFlow in production environments for critical applications—such as financial services, healthcare, manufacturing, or public sector AI initiatives—may experience service interruptions if an attacker with appropriate privileges exploits this vulnerability. Although exploitation requires some level of privilege (e.g., the ability to submit or manipulate machine learning jobs), the resulting denial of service could disrupt automated decision-making systems, data processing pipelines, or AI-driven services. This disruption could lead to operational delays, loss of productivity, or degraded service quality. Since TensorFlow is widely used across industries in Europe, the vulnerability poses a moderate risk, especially in environments where TensorFlow is exposed to multiple users or integrated into multi-tenant platforms. However, the lack of confidentiality or integrity impact limits the severity to availability concerns only.
Mitigation Recommendations
European organizations should take the following specific mitigation steps: 1) Identify all instances of TensorFlow in their environments, including development, testing, and production systems. 2) Prioritize upgrading TensorFlow to version 2.8.0 or later, or apply backported patches available for versions 2.5.3, 2.6.3, and 2.7.1, to remediate the vulnerability. 3) Implement strict input validation and sanitization for any user-provided tensor dimensions or data that interact with TensorFlow APIs, reducing the risk of triggering the integer overflow. 4) Restrict privileges for users or processes that can submit or modify machine learning jobs to minimize the attack surface. 5) Monitor TensorFlow application logs and system stability to detect unusual crashes or denial of service symptoms potentially linked to this vulnerability. 6) For multi-tenant or cloud environments, isolate TensorFlow workloads per tenant to prevent cross-tenant impact. 7) Incorporate vulnerability scanning and patch management processes specifically for machine learning frameworks to ensure timely updates.
Affected Countries
For access to advanced analysis and higher rate limits, contact root@offseq.com
Technical Details
- Data Version
- 5.1
- Assigner Short Name
- GitHub_M
- Date Reserved
- 2022-01-19T00:00:00.000Z
- Cisa Enriched
- true
- Cvss Version
- 3.1
- State
- PUBLISHED
Threat ID: 682d981ec4522896dcbdc01e
Added to database: 5/21/2025, 9:08:46 AM
Last enriched: 7/6/2025, 11:39:44 PM
Last updated: 8/5/2025, 6:52:14 PM
Views: 10
Related Threats
CVE-2025-9094: Improper Neutralization of Special Elements Used in a Template Engine in ThingsBoard
MediumCVE-2025-9093: Improper Export of Android Application Components in BuzzFeed App
MediumCVE-2025-9091: Hard-coded Credentials in Tenda AC20
LowCVE-2025-9090: Command Injection in Tenda AC20
MediumCVE-2025-9092: CWE-400 Uncontrolled Resource Consumption in Legion of the Bouncy Castle Inc. Bouncy Castle for Java - BC-FJA 2.1.0
LowActions
Updates to AI analysis are available only with a Pro account. Contact root@offseq.com for access.
External Links
Need enhanced features?
Contact root@offseq.com for Pro access with improved analysis and higher rate limits.