CVE-2022-23575: CWE-190: Integer Overflow or Wraparound in tensorflow tensorflow
Tensorflow is an Open Source Machine Learning Framework. The implementation of `OpLevelCostEstimator::CalculateTensorSize` is vulnerable to an integer overflow if an attacker can create an operation which would involve a tensor with large enough number of elements. The fix will be included in TensorFlow 2.8.0. We will also cherrypick this commit on TensorFlow 2.7.1, TensorFlow 2.6.3, and TensorFlow 2.5.3, as these are also affected and still in supported range.
AI Analysis
Technical Summary
CVE-2022-23575 is a medium-severity vulnerability affecting TensorFlow, an open-source machine learning framework widely used for developing and deploying machine learning models. The vulnerability arises from an integer overflow in the implementation of the function OpLevelCostEstimator::CalculateTensorSize. This function calculates the size of tensors involved in operations. If an attacker can craft an operation that involves a tensor with a sufficiently large number of elements, the integer calculation for the tensor size can overflow or wrap around. This overflow can lead to incorrect size computations, potentially causing buffer overflows, memory corruption, or other unexpected behavior during tensor operations. The vulnerability affects TensorFlow versions prior to 2.7.1 (specifically >= 2.7.0 and < 2.7.1), versions >= 2.6.0 and < 2.6.3, and versions below 2.5.3. The issue was addressed in TensorFlow 2.8.0, with backported fixes planned for 2.7.1, 2.6.3, and 2.5.3. No known exploits have been reported in the wild to date. The vulnerability falls under CWE-190 (Integer Overflow or Wraparound), which is a common class of errors that can lead to serious security issues if exploited. Exploitation requires the ability to create or influence operations involving large tensors, which implies some level of access to the TensorFlow environment or the ability to submit models or operations for execution. The vulnerability could be leveraged to cause denial of service or potentially arbitrary code execution depending on how the overflow impacts memory management within TensorFlow's runtime.
Potential Impact
For European organizations, the impact of this vulnerability depends largely on the extent to which TensorFlow is used in their machine learning pipelines, especially in environments where untrusted or semi-trusted users can submit models or operations for execution. Organizations in sectors such as finance, healthcare, automotive, and telecommunications that rely on TensorFlow for AI-driven analytics, autonomous systems, or critical decision-making could face risks including denial of service or data corruption. The integer overflow could lead to memory corruption, which in turn might be exploited to execute arbitrary code, compromising confidentiality, integrity, and availability of machine learning systems and potentially the broader IT infrastructure. Given the increasing adoption of AI and machine learning in European industries, the vulnerability poses a moderate risk, particularly in multi-tenant or cloud environments where attackers might have the opportunity to submit crafted operations. However, the lack of known exploits and the requirement to influence tensor operations limit the immediate threat level. Still, the vulnerability could be leveraged in targeted attacks against organizations with high-value AI assets or sensitive data processed via TensorFlow.
Mitigation Recommendations
European organizations should prioritize upgrading TensorFlow installations to version 2.8.0 or later, or apply the backported patches for versions 2.7.1, 2.6.3, and 2.5.3 as soon as they become available. In environments where immediate patching is not feasible, organizations should restrict the ability to submit or execute untrusted or user-supplied TensorFlow operations, especially those involving large tensors. Implement strict input validation and operation size limits to prevent the creation of excessively large tensors that could trigger the overflow. Monitoring and logging of TensorFlow operation submissions can help detect anomalous or suspicious activity indicative of exploitation attempts. Additionally, running TensorFlow workloads in isolated, sandboxed environments can limit the impact of potential memory corruption. Organizations should also review their machine learning deployment pipelines to ensure that only trusted models and operations are executed. Finally, maintaining up-to-date threat intelligence and monitoring for any emerging exploit reports related to this vulnerability is recommended.
Affected Countries
Germany, France, United Kingdom, Netherlands, Sweden, Finland, Italy, Spain
CVE-2022-23575: CWE-190: Integer Overflow or Wraparound in tensorflow tensorflow
Description
Tensorflow is an Open Source Machine Learning Framework. The implementation of `OpLevelCostEstimator::CalculateTensorSize` is vulnerable to an integer overflow if an attacker can create an operation which would involve a tensor with large enough number of elements. The fix will be included in TensorFlow 2.8.0. We will also cherrypick this commit on TensorFlow 2.7.1, TensorFlow 2.6.3, and TensorFlow 2.5.3, as these are also affected and still in supported range.
AI-Powered Analysis
Technical Analysis
CVE-2022-23575 is a medium-severity vulnerability affecting TensorFlow, an open-source machine learning framework widely used for developing and deploying machine learning models. The vulnerability arises from an integer overflow in the implementation of the function OpLevelCostEstimator::CalculateTensorSize. This function calculates the size of tensors involved in operations. If an attacker can craft an operation that involves a tensor with a sufficiently large number of elements, the integer calculation for the tensor size can overflow or wrap around. This overflow can lead to incorrect size computations, potentially causing buffer overflows, memory corruption, or other unexpected behavior during tensor operations. The vulnerability affects TensorFlow versions prior to 2.7.1 (specifically >= 2.7.0 and < 2.7.1), versions >= 2.6.0 and < 2.6.3, and versions below 2.5.3. The issue was addressed in TensorFlow 2.8.0, with backported fixes planned for 2.7.1, 2.6.3, and 2.5.3. No known exploits have been reported in the wild to date. The vulnerability falls under CWE-190 (Integer Overflow or Wraparound), which is a common class of errors that can lead to serious security issues if exploited. Exploitation requires the ability to create or influence operations involving large tensors, which implies some level of access to the TensorFlow environment or the ability to submit models or operations for execution. The vulnerability could be leveraged to cause denial of service or potentially arbitrary code execution depending on how the overflow impacts memory management within TensorFlow's runtime.
Potential Impact
For European organizations, the impact of this vulnerability depends largely on the extent to which TensorFlow is used in their machine learning pipelines, especially in environments where untrusted or semi-trusted users can submit models or operations for execution. Organizations in sectors such as finance, healthcare, automotive, and telecommunications that rely on TensorFlow for AI-driven analytics, autonomous systems, or critical decision-making could face risks including denial of service or data corruption. The integer overflow could lead to memory corruption, which in turn might be exploited to execute arbitrary code, compromising confidentiality, integrity, and availability of machine learning systems and potentially the broader IT infrastructure. Given the increasing adoption of AI and machine learning in European industries, the vulnerability poses a moderate risk, particularly in multi-tenant or cloud environments where attackers might have the opportunity to submit crafted operations. However, the lack of known exploits and the requirement to influence tensor operations limit the immediate threat level. Still, the vulnerability could be leveraged in targeted attacks against organizations with high-value AI assets or sensitive data processed via TensorFlow.
Mitigation Recommendations
European organizations should prioritize upgrading TensorFlow installations to version 2.8.0 or later, or apply the backported patches for versions 2.7.1, 2.6.3, and 2.5.3 as soon as they become available. In environments where immediate patching is not feasible, organizations should restrict the ability to submit or execute untrusted or user-supplied TensorFlow operations, especially those involving large tensors. Implement strict input validation and operation size limits to prevent the creation of excessively large tensors that could trigger the overflow. Monitoring and logging of TensorFlow operation submissions can help detect anomalous or suspicious activity indicative of exploitation attempts. Additionally, running TensorFlow workloads in isolated, sandboxed environments can limit the impact of potential memory corruption. Organizations should also review their machine learning deployment pipelines to ensure that only trusted models and operations are executed. Finally, maintaining up-to-date threat intelligence and monitoring for any emerging exploit reports related to this vulnerability is recommended.
Affected Countries
For access to advanced analysis and higher rate limits, contact root@offseq.com
Technical Details
- Data Version
- 5.1
- Assigner Short Name
- GitHub_M
- Date Reserved
- 2022-01-19T00:00:00.000Z
- Cisa Enriched
- true
Threat ID: 682d9848c4522896dcbf6183
Added to database: 5/21/2025, 9:09:28 AM
Last enriched: 6/22/2025, 4:06:17 AM
Last updated: 7/26/2025, 9:51:55 AM
Views: 13
Related Threats
CVE-2025-8690: CWE-79 Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting') in addix Simple Responsive Slider
MediumCVE-2025-8688: CWE-79 Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting') in ebernstein Inline Stock Quotes
MediumCVE-2025-8685: CWE-79 Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting') in emilien Wp chart generator
MediumCVE-2025-8621: CWE-80 Improper Neutralization of Script-Related HTML Tags in a Web Page (Basic XSS) in odn Mosaic Generator
MediumCVE-2025-8568: CWE-79 Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting') in prabode GMap Generator
MediumActions
Updates to AI analysis are available only with a Pro account. Contact root@offseq.com for access.
External Links
Need enhanced features?
Contact root@offseq.com for Pro access with improved analysis and higher rate limits.