Skip to main content

CVE-2022-35934: CWE-617: Reachable Assertion in tensorflow tensorflow

Medium
Published: Fri Sep 16 2022 (09/16/2022, 19:30:13 UTC)
Source: CVE
Vendor/Project: tensorflow
Product: tensorflow

Description

TensorFlow is an open source platform for machine learning. The implementation of tf.reshape op in TensorFlow is vulnerable to a denial of service via CHECK-failure (assertion failure) caused by overflowing the number of elements in a tensor. This issue has been patched in GitHub commit 61f0f9b94df8c0411f0ad0ecc2fec2d3f3c33555. The fix will be included in TensorFlow 2.10.0. We will also cherrypick this commit on TensorFlow 2.9.1, TensorFlow 2.8.1, and TensorFlow 2.7.2, as these are also affected and still in supported range. There are no known workarounds for this issue.

AI-Powered Analysis

AILast updated: 06/22/2025, 20:34:38 UTC

Technical Analysis

CVE-2022-35934 is a vulnerability in TensorFlow, an open-source machine learning platform widely used for developing and deploying ML models. The issue arises from the implementation of the tf.reshape operation, which is responsible for changing the shape of a tensor without altering its data. Specifically, the vulnerability is a reachable assertion failure (CWE-617) caused by an integer overflow when calculating the number of elements in a tensor during a reshape operation. This overflow leads to a CHECK-failure, triggering an assertion failure that causes the TensorFlow process to terminate unexpectedly, resulting in a denial of service (DoS). The vulnerability affects multiple TensorFlow versions: all versions prior to 2.7.2, versions between 2.8.0 and before 2.8.1, and versions between 2.9.0 and before 2.9.1. The issue was patched in a GitHub commit (61f0f9b94df8c0411f0ad0ecc2fec2d3f3c33555) and included in TensorFlow 2.10.0, with backports planned for 2.7.2, 2.8.1, and 2.9.1. There are no known workarounds, meaning that unpatched systems remain vulnerable. Exploitation does not require user interaction or authentication, but it requires the ability to submit crafted inputs to TensorFlow's tf.reshape operation. No known exploits have been observed in the wild to date. The vulnerability impacts availability by causing service crashes but does not directly affect confidentiality or integrity of data or models.

Potential Impact

For European organizations, the primary impact of CVE-2022-35934 is a denial of service condition in systems that utilize vulnerable TensorFlow versions. This can disrupt machine learning workflows, automated data processing, and AI-driven applications, potentially halting critical business operations or research activities. Organizations relying on TensorFlow for real-time inference or production ML pipelines may experience downtime or degraded service quality. While the vulnerability does not lead to data breaches or unauthorized code execution, the interruption of ML services can affect sectors such as finance, healthcare, manufacturing, and autonomous systems where AI models are integral. Additionally, organizations providing ML-as-a-service or cloud-based AI platforms may face reputational damage and customer dissatisfaction if service availability is compromised. Since no authentication or user interaction is required, any exposed TensorFlow service accepting reshape operations could be targeted remotely, increasing the risk surface. However, the absence of known exploits and the medium severity rating suggest the threat is moderate but should not be underestimated in critical environments.

Mitigation Recommendations

To mitigate this vulnerability, European organizations should prioritize upgrading TensorFlow installations to version 2.10.0 or later, or apply the backported patches for versions 2.7.2, 2.8.1, and 2.9.1 as soon as possible. Since no workarounds exist, patching is the only effective defense. Organizations should audit their environments to identify all TensorFlow deployments, including development, testing, and production systems, to ensure none remain on vulnerable versions. For environments where immediate patching is not feasible, consider isolating TensorFlow services behind strict network controls and input validation layers to limit exposure to untrusted inputs that could trigger the vulnerability. Implement monitoring to detect abnormal TensorFlow process crashes or service interruptions that may indicate exploitation attempts. Additionally, review and harden the input validation logic in ML pipelines to prevent malformed tensor shapes from reaching the tf.reshape operation. Finally, incorporate this vulnerability into incident response and vulnerability management workflows to ensure timely detection and remediation.

Need more detailed analysis?Get Pro

Technical Details

Data Version
5.1
Assigner Short Name
GitHub_M
Date Reserved
2022-07-15T00:00:00.000Z
Cisa Enriched
true

Threat ID: 682d9845c4522896dcbf3fbe

Added to database: 5/21/2025, 9:09:25 AM

Last enriched: 6/22/2025, 8:34:38 PM

Last updated: 8/15/2025, 7:29:51 PM

Views: 17

Actions

PRO

Updates to AI analysis are available only with a Pro account. Contact root@offseq.com for access.

Please log in to the Console to use AI analysis features.

Need enhanced features?

Contact root@offseq.com for Pro access with improved analysis and higher rate limits.

Latest Threats