CVE-2022-35934: CWE-617: Reachable Assertion in tensorflow tensorflow
TensorFlow is an open source platform for machine learning. The implementation of tf.reshape op in TensorFlow is vulnerable to a denial of service via CHECK-failure (assertion failure) caused by overflowing the number of elements in a tensor. This issue has been patched in GitHub commit 61f0f9b94df8c0411f0ad0ecc2fec2d3f3c33555. The fix will be included in TensorFlow 2.10.0. We will also cherrypick this commit on TensorFlow 2.9.1, TensorFlow 2.8.1, and TensorFlow 2.7.2, as these are also affected and still in supported range. There are no known workarounds for this issue.
AI Analysis
Technical Summary
CVE-2022-35934 is a vulnerability in TensorFlow, an open-source machine learning platform widely used for developing and deploying ML models. The issue arises from the implementation of the tf.reshape operation, which is responsible for changing the shape of a tensor without altering its data. Specifically, the vulnerability is a reachable assertion failure (CWE-617) caused by an integer overflow when calculating the number of elements in a tensor during a reshape operation. This overflow leads to a CHECK-failure, triggering an assertion failure that causes the TensorFlow process to terminate unexpectedly, resulting in a denial of service (DoS). The vulnerability affects multiple TensorFlow versions: all versions prior to 2.7.2, versions between 2.8.0 and before 2.8.1, and versions between 2.9.0 and before 2.9.1. The issue was patched in a GitHub commit (61f0f9b94df8c0411f0ad0ecc2fec2d3f3c33555) and included in TensorFlow 2.10.0, with backports planned for 2.7.2, 2.8.1, and 2.9.1. There are no known workarounds, meaning that unpatched systems remain vulnerable. Exploitation does not require user interaction or authentication, but it requires the ability to submit crafted inputs to TensorFlow's tf.reshape operation. No known exploits have been observed in the wild to date. The vulnerability impacts availability by causing service crashes but does not directly affect confidentiality or integrity of data or models.
Potential Impact
For European organizations, the primary impact of CVE-2022-35934 is a denial of service condition in systems that utilize vulnerable TensorFlow versions. This can disrupt machine learning workflows, automated data processing, and AI-driven applications, potentially halting critical business operations or research activities. Organizations relying on TensorFlow for real-time inference or production ML pipelines may experience downtime or degraded service quality. While the vulnerability does not lead to data breaches or unauthorized code execution, the interruption of ML services can affect sectors such as finance, healthcare, manufacturing, and autonomous systems where AI models are integral. Additionally, organizations providing ML-as-a-service or cloud-based AI platforms may face reputational damage and customer dissatisfaction if service availability is compromised. Since no authentication or user interaction is required, any exposed TensorFlow service accepting reshape operations could be targeted remotely, increasing the risk surface. However, the absence of known exploits and the medium severity rating suggest the threat is moderate but should not be underestimated in critical environments.
Mitigation Recommendations
To mitigate this vulnerability, European organizations should prioritize upgrading TensorFlow installations to version 2.10.0 or later, or apply the backported patches for versions 2.7.2, 2.8.1, and 2.9.1 as soon as possible. Since no workarounds exist, patching is the only effective defense. Organizations should audit their environments to identify all TensorFlow deployments, including development, testing, and production systems, to ensure none remain on vulnerable versions. For environments where immediate patching is not feasible, consider isolating TensorFlow services behind strict network controls and input validation layers to limit exposure to untrusted inputs that could trigger the vulnerability. Implement monitoring to detect abnormal TensorFlow process crashes or service interruptions that may indicate exploitation attempts. Additionally, review and harden the input validation logic in ML pipelines to prevent malformed tensor shapes from reaching the tf.reshape operation. Finally, incorporate this vulnerability into incident response and vulnerability management workflows to ensure timely detection and remediation.
Affected Countries
Germany, France, United Kingdom, Netherlands, Sweden, Finland, Denmark, Ireland, Belgium, Italy
CVE-2022-35934: CWE-617: Reachable Assertion in tensorflow tensorflow
Description
TensorFlow is an open source platform for machine learning. The implementation of tf.reshape op in TensorFlow is vulnerable to a denial of service via CHECK-failure (assertion failure) caused by overflowing the number of elements in a tensor. This issue has been patched in GitHub commit 61f0f9b94df8c0411f0ad0ecc2fec2d3f3c33555. The fix will be included in TensorFlow 2.10.0. We will also cherrypick this commit on TensorFlow 2.9.1, TensorFlow 2.8.1, and TensorFlow 2.7.2, as these are also affected and still in supported range. There are no known workarounds for this issue.
AI-Powered Analysis
Technical Analysis
CVE-2022-35934 is a vulnerability in TensorFlow, an open-source machine learning platform widely used for developing and deploying ML models. The issue arises from the implementation of the tf.reshape operation, which is responsible for changing the shape of a tensor without altering its data. Specifically, the vulnerability is a reachable assertion failure (CWE-617) caused by an integer overflow when calculating the number of elements in a tensor during a reshape operation. This overflow leads to a CHECK-failure, triggering an assertion failure that causes the TensorFlow process to terminate unexpectedly, resulting in a denial of service (DoS). The vulnerability affects multiple TensorFlow versions: all versions prior to 2.7.2, versions between 2.8.0 and before 2.8.1, and versions between 2.9.0 and before 2.9.1. The issue was patched in a GitHub commit (61f0f9b94df8c0411f0ad0ecc2fec2d3f3c33555) and included in TensorFlow 2.10.0, with backports planned for 2.7.2, 2.8.1, and 2.9.1. There are no known workarounds, meaning that unpatched systems remain vulnerable. Exploitation does not require user interaction or authentication, but it requires the ability to submit crafted inputs to TensorFlow's tf.reshape operation. No known exploits have been observed in the wild to date. The vulnerability impacts availability by causing service crashes but does not directly affect confidentiality or integrity of data or models.
Potential Impact
For European organizations, the primary impact of CVE-2022-35934 is a denial of service condition in systems that utilize vulnerable TensorFlow versions. This can disrupt machine learning workflows, automated data processing, and AI-driven applications, potentially halting critical business operations or research activities. Organizations relying on TensorFlow for real-time inference or production ML pipelines may experience downtime or degraded service quality. While the vulnerability does not lead to data breaches or unauthorized code execution, the interruption of ML services can affect sectors such as finance, healthcare, manufacturing, and autonomous systems where AI models are integral. Additionally, organizations providing ML-as-a-service or cloud-based AI platforms may face reputational damage and customer dissatisfaction if service availability is compromised. Since no authentication or user interaction is required, any exposed TensorFlow service accepting reshape operations could be targeted remotely, increasing the risk surface. However, the absence of known exploits and the medium severity rating suggest the threat is moderate but should not be underestimated in critical environments.
Mitigation Recommendations
To mitigate this vulnerability, European organizations should prioritize upgrading TensorFlow installations to version 2.10.0 or later, or apply the backported patches for versions 2.7.2, 2.8.1, and 2.9.1 as soon as possible. Since no workarounds exist, patching is the only effective defense. Organizations should audit their environments to identify all TensorFlow deployments, including development, testing, and production systems, to ensure none remain on vulnerable versions. For environments where immediate patching is not feasible, consider isolating TensorFlow services behind strict network controls and input validation layers to limit exposure to untrusted inputs that could trigger the vulnerability. Implement monitoring to detect abnormal TensorFlow process crashes or service interruptions that may indicate exploitation attempts. Additionally, review and harden the input validation logic in ML pipelines to prevent malformed tensor shapes from reaching the tf.reshape operation. Finally, incorporate this vulnerability into incident response and vulnerability management workflows to ensure timely detection and remediation.
For access to advanced analysis and higher rate limits, contact root@offseq.com
Technical Details
- Data Version
- 5.1
- Assigner Short Name
- GitHub_M
- Date Reserved
- 2022-07-15T00:00:00.000Z
- Cisa Enriched
- true
Threat ID: 682d9845c4522896dcbf3fbe
Added to database: 5/21/2025, 9:09:25 AM
Last enriched: 6/22/2025, 8:34:38 PM
Last updated: 8/15/2025, 7:29:51 PM
Views: 17
Related Threats
CVE-2025-53948: CWE-415 Double Free in Santesoft Sante PACS Server
HighCVE-2025-52584: CWE-122 Heap-based Buffer Overflow in Ashlar-Vellum Cobalt
HighCVE-2025-46269: CWE-122 Heap-based Buffer Overflow in Ashlar-Vellum Cobalt
HighCVE-2025-54862: CWE-79 Improper Neutralization of Input During Web Page Generation (XSS or 'Cross-site Scripting') in Santesoft Sante PACS Server
MediumCVE-2025-54759: CWE-79 Improper Neutralization of Input During Web Page Generation (XSS or 'Cross-site Scripting') in Santesoft Sante PACS Server
MediumActions
Updates to AI analysis are available only with a Pro account. Contact root@offseq.com for access.
External Links
Need enhanced features?
Contact root@offseq.com for Pro access with improved analysis and higher rate limits.