CVE-2022-35935: CWE-617: Reachable Assertion in tensorflow tensorflow
TensorFlow is an open source platform for machine learning. The implementation of SobolSampleOp is vulnerable to a denial of service via CHECK-failure (assertion failure) caused by assuming `input(0)`, `input(1)`, and `input(2)` to be scalar. This issue has been patched in GitHub commit c65c67f88ad770662e8f191269a907bf2b94b1bf. The fix will be included in TensorFlow 2.10.0. We will also cherrypick this commit on TensorFlow 2.9.1, TensorFlow 2.8.1, and TensorFlow 2.7.2, as these are also affected and still in supported range. There are no known workarounds for this issue.
AI Analysis
Technical Summary
CVE-2022-35935 is a medium-severity vulnerability affecting the TensorFlow machine learning platform, specifically within the SobolSampleOp operation. TensorFlow is widely used for developing and deploying machine learning models. The vulnerability arises from an assumption in the SobolSampleOp implementation that its first three inputs (`input(0)`, `input(1)`, and `input(2)`) are scalar values. This assumption leads to a reachable assertion failure (CWE-617) when the inputs do not meet this condition, causing the program to terminate unexpectedly due to a CHECK-failure. This results in a denial of service (DoS) condition, where the affected TensorFlow process crashes and becomes unavailable. The issue affects multiple TensorFlow versions: all versions prior to 2.7.2, versions from 2.8.0 up to but not including 2.8.1, and versions from 2.9.0 up to but not including 2.9.1. The vulnerability has been patched in commit c65c67f88ad770662e8f191269a907bf2b94b1bf and will be included in TensorFlow 2.10.0, with backported fixes for 2.9.1, 2.8.1, and 2.7.2. There are no known workarounds, and no exploits have been observed in the wild to date. Exploitation requires the attacker to supply crafted inputs to the SobolSampleOp operation, which is typically used in stochastic sampling within TensorFlow models. The vulnerability impacts the availability of TensorFlow-based services or applications by causing crashes, but does not directly compromise confidentiality or integrity. The vulnerability does not require authentication but does require the ability to influence or supply inputs to the affected TensorFlow operation, which may limit exposure depending on deployment context.
Potential Impact
For European organizations, the primary impact of CVE-2022-35935 is a denial of service condition affecting TensorFlow-based machine learning workloads. Organizations relying on TensorFlow for critical AI/ML applications—such as financial institutions using ML for fraud detection, healthcare providers using AI for diagnostics, or manufacturing firms employing predictive maintenance—may experience service interruptions or degraded performance if vulnerable versions are exploited. This can lead to operational disruptions, delayed decision-making, and potential financial losses. Since the vulnerability causes assertion failures leading to crashes, availability is the main concern; confidentiality and integrity are not directly impacted. However, repeated crashes or service downtime could indirectly affect data processing pipelines and business continuity. The lack of known exploits in the wild reduces immediate risk, but the widespread use of TensorFlow in Europe means that unpatched systems remain vulnerable to potential future attacks. Additionally, organizations that expose TensorFlow models via APIs or cloud services may be more exposed if attackers can supply malicious inputs remotely. Given the increasing reliance on AI/ML in European digital transformation initiatives, this vulnerability could impact sectors with high strategic importance, including finance, healthcare, automotive, and public sector services.
Mitigation Recommendations
To mitigate CVE-2022-35935, European organizations should: 1) Identify all TensorFlow deployments and verify the versions in use. Focus on versions prior to 2.7.2, between 2.8.0 and 2.8.1, and between 2.9.0 and 2.9.1, which are vulnerable. 2) Apply the official patches by upgrading to TensorFlow 2.10.0 or later, or to the patched versions 2.9.1, 2.8.1, or 2.7.2 as appropriate. 3) If immediate patching is not feasible, restrict access to TensorFlow model endpoints to trusted users and networks to reduce the risk of malicious input injection. 4) Implement input validation and sanitization at the application layer to ensure that inputs to SobolSampleOp or related TensorFlow operations conform to expected scalar types, where possible. 5) Monitor TensorFlow service logs for unexpected crashes or assertion failures that may indicate attempted exploitation. 6) Incorporate TensorFlow version checks into vulnerability management and patch management workflows to ensure timely updates. 7) For cloud-based TensorFlow services, coordinate with cloud providers to confirm patch status and apply mitigations. 8) Educate development and data science teams about the vulnerability to avoid deploying vulnerable versions in production. These steps go beyond generic advice by emphasizing version-specific patching, input validation, access controls, and operational monitoring tailored to TensorFlow environments.
Affected Countries
Germany, France, United Kingdom, Netherlands, Sweden, Finland, Italy, Spain, Poland
CVE-2022-35935: CWE-617: Reachable Assertion in tensorflow tensorflow
Description
TensorFlow is an open source platform for machine learning. The implementation of SobolSampleOp is vulnerable to a denial of service via CHECK-failure (assertion failure) caused by assuming `input(0)`, `input(1)`, and `input(2)` to be scalar. This issue has been patched in GitHub commit c65c67f88ad770662e8f191269a907bf2b94b1bf. The fix will be included in TensorFlow 2.10.0. We will also cherrypick this commit on TensorFlow 2.9.1, TensorFlow 2.8.1, and TensorFlow 2.7.2, as these are also affected and still in supported range. There are no known workarounds for this issue.
AI-Powered Analysis
Technical Analysis
CVE-2022-35935 is a medium-severity vulnerability affecting the TensorFlow machine learning platform, specifically within the SobolSampleOp operation. TensorFlow is widely used for developing and deploying machine learning models. The vulnerability arises from an assumption in the SobolSampleOp implementation that its first three inputs (`input(0)`, `input(1)`, and `input(2)`) are scalar values. This assumption leads to a reachable assertion failure (CWE-617) when the inputs do not meet this condition, causing the program to terminate unexpectedly due to a CHECK-failure. This results in a denial of service (DoS) condition, where the affected TensorFlow process crashes and becomes unavailable. The issue affects multiple TensorFlow versions: all versions prior to 2.7.2, versions from 2.8.0 up to but not including 2.8.1, and versions from 2.9.0 up to but not including 2.9.1. The vulnerability has been patched in commit c65c67f88ad770662e8f191269a907bf2b94b1bf and will be included in TensorFlow 2.10.0, with backported fixes for 2.9.1, 2.8.1, and 2.7.2. There are no known workarounds, and no exploits have been observed in the wild to date. Exploitation requires the attacker to supply crafted inputs to the SobolSampleOp operation, which is typically used in stochastic sampling within TensorFlow models. The vulnerability impacts the availability of TensorFlow-based services or applications by causing crashes, but does not directly compromise confidentiality or integrity. The vulnerability does not require authentication but does require the ability to influence or supply inputs to the affected TensorFlow operation, which may limit exposure depending on deployment context.
Potential Impact
For European organizations, the primary impact of CVE-2022-35935 is a denial of service condition affecting TensorFlow-based machine learning workloads. Organizations relying on TensorFlow for critical AI/ML applications—such as financial institutions using ML for fraud detection, healthcare providers using AI for diagnostics, or manufacturing firms employing predictive maintenance—may experience service interruptions or degraded performance if vulnerable versions are exploited. This can lead to operational disruptions, delayed decision-making, and potential financial losses. Since the vulnerability causes assertion failures leading to crashes, availability is the main concern; confidentiality and integrity are not directly impacted. However, repeated crashes or service downtime could indirectly affect data processing pipelines and business continuity. The lack of known exploits in the wild reduces immediate risk, but the widespread use of TensorFlow in Europe means that unpatched systems remain vulnerable to potential future attacks. Additionally, organizations that expose TensorFlow models via APIs or cloud services may be more exposed if attackers can supply malicious inputs remotely. Given the increasing reliance on AI/ML in European digital transformation initiatives, this vulnerability could impact sectors with high strategic importance, including finance, healthcare, automotive, and public sector services.
Mitigation Recommendations
To mitigate CVE-2022-35935, European organizations should: 1) Identify all TensorFlow deployments and verify the versions in use. Focus on versions prior to 2.7.2, between 2.8.0 and 2.8.1, and between 2.9.0 and 2.9.1, which are vulnerable. 2) Apply the official patches by upgrading to TensorFlow 2.10.0 or later, or to the patched versions 2.9.1, 2.8.1, or 2.7.2 as appropriate. 3) If immediate patching is not feasible, restrict access to TensorFlow model endpoints to trusted users and networks to reduce the risk of malicious input injection. 4) Implement input validation and sanitization at the application layer to ensure that inputs to SobolSampleOp or related TensorFlow operations conform to expected scalar types, where possible. 5) Monitor TensorFlow service logs for unexpected crashes or assertion failures that may indicate attempted exploitation. 6) Incorporate TensorFlow version checks into vulnerability management and patch management workflows to ensure timely updates. 7) For cloud-based TensorFlow services, coordinate with cloud providers to confirm patch status and apply mitigations. 8) Educate development and data science teams about the vulnerability to avoid deploying vulnerable versions in production. These steps go beyond generic advice by emphasizing version-specific patching, input validation, access controls, and operational monitoring tailored to TensorFlow environments.
Affected Countries
For access to advanced analysis and higher rate limits, contact root@offseq.com
Technical Details
- Data Version
- 5.1
- Assigner Short Name
- GitHub_M
- Date Reserved
- 2022-07-15T00:00:00.000Z
- Cisa Enriched
- true
Threat ID: 682d9845c4522896dcbf3fd7
Added to database: 5/21/2025, 9:09:25 AM
Last enriched: 6/22/2025, 8:21:28 PM
Last updated: 8/15/2025, 7:58:02 AM
Views: 9
Related Threats
CVE-2025-53948: CWE-415 Double Free in Santesoft Sante PACS Server
HighCVE-2025-52584: CWE-122 Heap-based Buffer Overflow in Ashlar-Vellum Cobalt
HighCVE-2025-46269: CWE-122 Heap-based Buffer Overflow in Ashlar-Vellum Cobalt
HighCVE-2025-54862: CWE-79 Improper Neutralization of Input During Web Page Generation (XSS or 'Cross-site Scripting') in Santesoft Sante PACS Server
MediumCVE-2025-54759: CWE-79 Improper Neutralization of Input During Web Page Generation (XSS or 'Cross-site Scripting') in Santesoft Sante PACS Server
MediumActions
Updates to AI analysis are available only with a Pro account. Contact root@offseq.com for access.
External Links
Need enhanced features?
Contact root@offseq.com for Pro access with improved analysis and higher rate limits.