Skip to main content
Press slash or control plus K to focus the search. Use the arrow keys to navigate results and press enter to open a threat.
Reconnecting to live updates…

CVE-2022-29211: CWE-20: Improper Input Validation in tensorflow tensorflow

0
Medium
Published: Fri May 20 2022 (05/20/2022, 23:20:15 UTC)
Source: CVE
Vendor/Project: tensorflow
Product: tensorflow

Description

TensorFlow is an open source platform for machine learning. Prior to versions 2.9.0, 2.8.1, 2.7.2, and 2.6.4, the implementation of `tf.histogram_fixed_width` is vulnerable to a crash when the values array contain `Not a Number` (`NaN`) elements. The implementation assumes that all floating point operations are defined and then converts a floating point result to an integer index. If `values` contains `NaN` then the result of the division is still `NaN` and the cast to `int32` would result in a crash. This only occurs on the CPU implementation. Versions 2.9.0, 2.8.1, 2.7.2, and 2.6.4 contain a patch for this issue.

AI-Powered Analysis

AILast updated: 06/22/2025, 01:08:11 UTC

Technical Analysis

CVE-2022-29211 is a medium-severity vulnerability affecting multiple versions of TensorFlow, an open-source machine learning platform widely used for developing and deploying machine learning models. The vulnerability arises from improper input validation (CWE-20) in the implementation of the function `tf.histogram_fixed_width`. Specifically, when the input array `values` contains 'Not a Number' (NaN) floating-point elements, the function attempts to perform floating-point division and subsequently cast the result to a 32-bit integer index. Since NaN values propagate through floating-point operations, the division result remains NaN, and casting this NaN to an integer causes the program to crash. This issue is limited to the CPU implementation of TensorFlow and does not affect GPU-based computations. The affected versions include all releases prior to 2.6.4, as well as certain release candidates and minor versions before 2.7.2, 2.8.1, and 2.9.0, which have incorporated patches to address this flaw. The vulnerability does not require authentication or user interaction to be triggered, but it requires that the attacker can supply crafted input data containing NaN values to the vulnerable function. There are no known exploits in the wild, and no direct patch links were provided in the source information. The root cause is a lack of proper input validation to handle edge cases like NaN, leading to a denial-of-service (DoS) condition via application crash. This vulnerability primarily impacts the availability of TensorFlow-based applications running on CPUs that process untrusted or malformed input data through `tf.histogram_fixed_width`.

Potential Impact

For European organizations, the impact of CVE-2022-29211 is primarily related to the availability and reliability of machine learning services and applications that utilize vulnerable TensorFlow versions on CPU platforms. Organizations in sectors such as finance, healthcare, automotive, and manufacturing that rely on TensorFlow for critical AI workloads could experience service disruptions or application crashes if attackers or malformed data trigger this vulnerability. Although the vulnerability does not directly compromise confidentiality or integrity, denial-of-service conditions can degrade operational continuity and potentially lead to cascading failures in dependent systems. Given the increasing adoption of AI and machine learning in Europe, especially in data-driven industries and research institutions, this vulnerability could affect production environments, automated decision-making systems, and real-time analytics pipelines. However, the impact is mitigated by the fact that exploitation requires the ability to supply crafted input data containing NaN values to the vulnerable function, which may limit exposure to internal or poorly sanitized data sources. Additionally, the absence of known exploits in the wild reduces immediate risk, but the vulnerability remains a concern for organizations that have not updated to patched TensorFlow versions.

Mitigation Recommendations

European organizations should take the following specific mitigation steps beyond generic patching advice: 1) Audit and inventory all TensorFlow deployments to identify versions prior to 2.6.4, 2.7.2, 2.8.1, and 2.9.0 and prioritize upgrading to the latest patched releases. 2) Implement input validation and sanitization at the application level to detect and filter out NaN values before they reach `tf.histogram_fixed_width` or similar TensorFlow functions, especially when processing untrusted or external data sources. 3) Employ runtime monitoring and anomaly detection to identify unusual crashes or denial-of-service symptoms in machine learning services, enabling rapid incident response. 4) For environments where immediate patching is not feasible, consider isolating TensorFlow workloads or restricting access to data inputs that could contain maliciously crafted NaN values. 5) Engage with development teams to review and harden machine learning pipelines against malformed data inputs and incorporate fuzz testing to detect similar input validation issues. 6) Maintain awareness of TensorFlow security advisories and subscribe to vendor notifications to promptly address future vulnerabilities.

Need more detailed analysis?Upgrade to Pro Console

Technical Details

Data Version
5.1
Assigner Short Name
GitHub_M
Date Reserved
2022-04-13T00:00:00.000Z
Cisa Enriched
true

Threat ID: 682d9848c4522896dcbf6556

Added to database: 5/21/2025, 9:09:28 AM

Last enriched: 6/22/2025, 1:08:11 AM

Last updated: 2/7/2026, 5:59:50 PM

Views: 36

Community Reviews

0 reviews

Crowdsource mitigation strategies, share intel context, and vote on the most helpful responses. Sign in to add your voice and help keep defenders ahead.

Sort by
Loading community insights…

Want to contribute mitigation steps or threat intel context? Sign in or create an account to join the community discussion.

Actions

PRO

Updates to AI analysis require Pro Console access. Upgrade inside Console → Billing.

Please log in to the Console to use AI analysis features.

Need more coverage?

Upgrade to Pro Console in Console -> Billing for AI refresh and higher limits.

For incident response and remediation, OffSeq services can help resolve threats faster.

Latest Threats