Skip to main content

CVE-2022-29191: CWE-20: Improper Input Validation in tensorflow tensorflow

Medium
Published: Fri May 20 2022 (05/20/2022, 20:50:11 UTC)
Source: CVE
Vendor/Project: tensorflow
Product: tensorflow

Description

TensorFlow is an open source platform for machine learning. Prior to versions 2.9.0, 2.8.1, 2.7.2, and 2.6.4, the implementation of `tf.raw_ops.GetSessionTensor` does not fully validate the input arguments. This results in a `CHECK`-failure which can be used to trigger a denial of service attack. Versions 2.9.0, 2.8.1, 2.7.2, and 2.6.4 contain a patch for this issue.

AI-Powered Analysis

AILast updated: 06/22/2025, 01:36:59 UTC

Technical Analysis

CVE-2022-29191 is a medium-severity vulnerability in TensorFlow, an open-source machine learning platform widely used for developing and deploying machine learning models. The vulnerability arises from improper input validation in the implementation of the TensorFlow operation `tf.raw_ops.GetSessionTensor`. Specifically, in versions prior to 2.6.4, and certain release candidates before 2.7.2, 2.8.1, and 2.9.0, the function does not fully validate its input arguments. This lack of validation can cause a CHECK-failure, which is a runtime assertion failure that terminates the process. An attacker can exploit this flaw by providing crafted inputs to trigger the CHECK-failure, resulting in a denial of service (DoS) condition. The vulnerability does not appear to allow code execution or data leakage but can disrupt availability by crashing applications or services that rely on TensorFlow. The issue has been patched in TensorFlow versions 2.6.4, 2.7.2, 2.8.1, and 2.9.0. There are no known exploits in the wild, and exploitation requires the attacker to interact with a TensorFlow instance that processes untrusted input through the vulnerable operation. Since TensorFlow is often embedded in machine learning pipelines, data science platforms, and AI-driven applications, this vulnerability could impact the stability of such systems if untrusted inputs are processed without proper sanitization or version updates.

Potential Impact

For European organizations, the primary impact of this vulnerability is the potential disruption of machine learning services and AI applications that utilize vulnerable TensorFlow versions. This could affect sectors relying heavily on AI and ML, such as finance, healthcare, automotive, and manufacturing, where TensorFlow is integrated into critical data processing or decision-making workflows. A denial of service could lead to temporary outages, loss of productivity, and potential delays in automated processes. While the vulnerability does not directly compromise confidentiality or integrity, the availability impact could indirectly affect business operations and service delivery. Organizations running TensorFlow in production environments, especially those exposing TensorFlow services to external or untrusted inputs, are at higher risk. The absence of known exploits reduces immediate threat levels, but the widespread use of TensorFlow means that unpatched systems remain vulnerable to potential future attacks or accidental crashes caused by malformed inputs.

Mitigation Recommendations

To mitigate this vulnerability, European organizations should: 1) Immediately upgrade TensorFlow to versions 2.6.4, 2.7.2, 2.8.1, 2.9.0, or later, as these contain the necessary patches. 2) Audit machine learning pipelines and applications to identify any use of the `tf.raw_ops.GetSessionTensor` operation, especially where inputs may originate from untrusted or external sources. 3) Implement input validation and sanitization at the application layer to prevent malformed or malicious inputs from reaching TensorFlow operations. 4) Employ runtime monitoring and anomaly detection to identify unexpected crashes or service disruptions potentially caused by this vulnerability. 5) For environments where immediate patching is not feasible, consider isolating TensorFlow services behind strict access controls and network segmentation to limit exposure. 6) Review and update incident response plans to include scenarios involving denial of service in AI/ML systems. These steps go beyond generic advice by focusing on the specific vulnerable operation and the context in which TensorFlow is used.

Need more detailed analysis?Get Pro

Technical Details

Data Version
5.1
Assigner Short Name
GitHub_M
Date Reserved
2022-04-13T00:00:00.000Z
Cisa Enriched
true

Threat ID: 682d9848c4522896dcbf64dd

Added to database: 5/21/2025, 9:09:28 AM

Last enriched: 6/22/2025, 1:36:59 AM

Last updated: 8/4/2025, 6:39:26 AM

Views: 11

Actions

PRO

Updates to AI analysis are available only with a Pro account. Contact root@offseq.com for access.

Please log in to the Console to use AI analysis features.

Need enhanced features?

Contact root@offseq.com for Pro access with improved analysis and higher rate limits.

Latest Threats