Skip to main content

CVE-2022-23571: CWE-617: Reachable Assertion in tensorflow tensorflow

Medium
Published: Fri Feb 04 2022 (02/04/2022, 22:32:34 UTC)
Source: CVE
Vendor/Project: tensorflow
Product: tensorflow

Description

Tensorflow is an Open Source Machine Learning Framework. When decoding a tensor from protobuf, a TensorFlow process can encounter cases where a `CHECK` assertion is invalidated based on user controlled arguments, if the tensors have an invalid `dtype` and 0 elements or an invalid shape. This allows attackers to cause denial of services in TensorFlow processes. The fix will be included in TensorFlow 2.8.0. We will also cherrypick this commit on TensorFlow 2.7.1, TensorFlow 2.6.3, and TensorFlow 2.5.3, as these are also affected and still in supported range.

AI-Powered Analysis

AILast updated: 06/23/2025, 16:48:04 UTC

Technical Analysis

CVE-2022-23571 is a medium severity vulnerability identified in TensorFlow, an open-source machine learning framework widely used for developing and deploying machine learning models. The vulnerability arises during the decoding of tensors from protobuf messages. Specifically, when a TensorFlow process attempts to decode a tensor with an invalid data type (dtype) combined with either zero elements or an invalid shape, a CHECK assertion within the TensorFlow codebase can be triggered. This assertion is reachable and can be invalidated by user-controlled inputs, leading to a denial of service (DoS) condition. The root cause is categorized under CWE-617 (Reachable Assertion), indicating that the program contains an assertion statement that can be triggered by crafted inputs, causing the program to abort unexpectedly. The vulnerability affects TensorFlow versions prior to 2.7.1 (for the 2.7.x branch), prior to 2.6.3 (for the 2.6.x branch), and versions before 2.5.3. The issue was addressed in TensorFlow 2.8.0 and backported to supported earlier versions. No known exploits have been reported in the wild to date. This vulnerability primarily impacts the availability of TensorFlow processes, as exploitation results in process termination due to assertion failure. Since TensorFlow is often integrated into larger applications and services, a successful exploitation could disrupt machine learning workflows, model training, or inference services relying on TensorFlow. The vulnerability requires that an attacker can supply or influence the protobuf-encoded tensor data processed by TensorFlow, which may be feasible in environments where untrusted data is ingested or where TensorFlow services are exposed to user inputs without sufficient validation. No authentication or user interaction is explicitly required beyond the ability to provide crafted tensor data inputs. The scope of affected systems includes any deployment of vulnerable TensorFlow versions that process protobuf tensors from potentially untrusted sources.

Potential Impact

For European organizations, the impact of this vulnerability can be significant depending on their reliance on TensorFlow for critical machine learning operations. Industries such as finance, healthcare, automotive, and manufacturing increasingly use TensorFlow for predictive analytics, autonomous systems, and AI-driven decision-making. A denial of service in TensorFlow could interrupt these services, leading to operational downtime, delayed analytics, or degraded AI functionality. This can affect service availability and potentially cause cascading failures in dependent systems. Organizations deploying TensorFlow in cloud environments, edge devices, or on-premises servers are all potentially at risk if they use affected versions and process untrusted tensor data. The vulnerability does not directly compromise confidentiality or integrity but impacts availability, which can have indirect effects on business continuity and service reliability. Given the lack of known exploits, the immediate risk is moderate; however, the widespread use of TensorFlow in European AI initiatives and digital transformation projects means that unpatched systems could become targets for denial of service attacks, especially in sectors with high availability requirements.

Mitigation Recommendations

European organizations should take the following specific and practical steps to mitigate this vulnerability: 1) Inventory and identify all TensorFlow deployments, including containerized, cloud-based, and embedded environments, to determine if affected versions are in use. 2) Upgrade TensorFlow installations to version 2.8.0 or later, or apply backported patches for supported earlier versions (2.7.1, 2.6.3, 2.5.3) as soon as possible to eliminate the vulnerability. 3) Implement strict input validation and sanitization for any protobuf tensor data received from external or untrusted sources to prevent malformed or malicious tensors from reaching TensorFlow processes. 4) Where feasible, isolate TensorFlow processing components behind access controls and network segmentation to limit exposure to untrusted inputs. 5) Monitor TensorFlow process stability and logs for unexpected crashes or assertion failures that could indicate attempted exploitation. 6) For organizations using TensorFlow in multi-tenant or shared environments, enforce tenant isolation and input filtering to reduce risk. 7) Engage with software supply chain teams to ensure that TensorFlow dependencies are regularly updated and vulnerability management processes include machine learning frameworks. These measures go beyond generic advice by emphasizing proactive patching, input validation, and architectural controls tailored to TensorFlow deployments.

Need more detailed analysis?Get Pro

Technical Details

Data Version
5.1
Assigner Short Name
GitHub_M
Date Reserved
2022-01-19T00:00:00.000Z
Cisa Enriched
true

Threat ID: 682d9842c4522896dcbf251c

Added to database: 5/21/2025, 9:09:22 AM

Last enriched: 6/23/2025, 4:48:04 PM

Last updated: 8/16/2025, 3:03:09 PM

Views: 14

Actions

PRO

Updates to AI analysis are available only with a Pro account. Contact root@offseq.com for access.

Please log in to the Console to use AI analysis features.

Need enhanced features?

Contact root@offseq.com for Pro access with improved analysis and higher rate limits.

Latest Threats