CVE-2022-35935: CWE-617: Reachable Assertion in tensorflow tensorflow
TensorFlow is an open source platform for machine learning. The implementation of SobolSampleOp is vulnerable to a denial of service via CHECK-failure (assertion failure) caused by assuming `input(0)`, `input(1)`, and `input(2)` to be scalar. This issue has been patched in GitHub commit c65c67f88ad770662e8f191269a907bf2b94b1bf. The fix will be included in TensorFlow 2.10.0. We will also cherrypick this commit on TensorFlow 2.9.1, TensorFlow 2.8.1, and TensorFlow 2.7.2, as these are also affected and still in supported range. There are no known workarounds for this issue.
AI Analysis
Technical Summary
CVE-2022-35935 is a medium-severity vulnerability affecting the TensorFlow machine learning platform, specifically within the SobolSampleOp operation. TensorFlow is widely used for developing and deploying machine learning models. The vulnerability arises from an assumption in the SobolSampleOp implementation that its first three inputs (`input(0)`, `input(1)`, and `input(2)`) are scalar values. This assumption leads to a reachable assertion failure (CWE-617) when the inputs do not meet this condition, causing the program to terminate unexpectedly due to a CHECK-failure. This results in a denial of service (DoS) condition, where the affected TensorFlow process crashes and becomes unavailable. The issue affects multiple TensorFlow versions: all versions prior to 2.7.2, versions from 2.8.0 up to but not including 2.8.1, and versions from 2.9.0 up to but not including 2.9.1. The vulnerability has been patched in commit c65c67f88ad770662e8f191269a907bf2b94b1bf and will be included in TensorFlow 2.10.0, with backported fixes for 2.9.1, 2.8.1, and 2.7.2. There are no known workarounds, and no exploits have been observed in the wild to date. Exploitation requires the attacker to supply crafted inputs to the SobolSampleOp operation, which is typically used in stochastic sampling within TensorFlow models. The vulnerability impacts the availability of TensorFlow-based services or applications by causing crashes, but does not directly compromise confidentiality or integrity. The vulnerability does not require authentication but does require the ability to influence or supply inputs to the affected TensorFlow operation, which may limit exposure depending on deployment context.
Potential Impact
For European organizations, the primary impact of CVE-2022-35935 is a denial of service condition affecting TensorFlow-based machine learning workloads. Organizations relying on TensorFlow for critical AI/ML applications—such as financial institutions using ML for fraud detection, healthcare providers using AI for diagnostics, or manufacturing firms employing predictive maintenance—may experience service interruptions or degraded performance if vulnerable versions are exploited. This can lead to operational disruptions, delayed decision-making, and potential financial losses. Since the vulnerability causes assertion failures leading to crashes, availability is the main concern; confidentiality and integrity are not directly impacted. However, repeated crashes or service downtime could indirectly affect data processing pipelines and business continuity. The lack of known exploits in the wild reduces immediate risk, but the widespread use of TensorFlow in Europe means that unpatched systems remain vulnerable to potential future attacks. Additionally, organizations that expose TensorFlow models via APIs or cloud services may be more exposed if attackers can supply malicious inputs remotely. Given the increasing reliance on AI/ML in European digital transformation initiatives, this vulnerability could impact sectors with high strategic importance, including finance, healthcare, automotive, and public sector services.
Mitigation Recommendations
To mitigate CVE-2022-35935, European organizations should: 1) Identify all TensorFlow deployments and verify the versions in use. Focus on versions prior to 2.7.2, between 2.8.0 and 2.8.1, and between 2.9.0 and 2.9.1, which are vulnerable. 2) Apply the official patches by upgrading to TensorFlow 2.10.0 or later, or to the patched versions 2.9.1, 2.8.1, or 2.7.2 as appropriate. 3) If immediate patching is not feasible, restrict access to TensorFlow model endpoints to trusted users and networks to reduce the risk of malicious input injection. 4) Implement input validation and sanitization at the application layer to ensure that inputs to SobolSampleOp or related TensorFlow operations conform to expected scalar types, where possible. 5) Monitor TensorFlow service logs for unexpected crashes or assertion failures that may indicate attempted exploitation. 6) Incorporate TensorFlow version checks into vulnerability management and patch management workflows to ensure timely updates. 7) For cloud-based TensorFlow services, coordinate with cloud providers to confirm patch status and apply mitigations. 8) Educate development and data science teams about the vulnerability to avoid deploying vulnerable versions in production. These steps go beyond generic advice by emphasizing version-specific patching, input validation, access controls, and operational monitoring tailored to TensorFlow environments.
Affected Countries
Germany, France, United Kingdom, Netherlands, Sweden, Finland, Italy, Spain, Poland
CVE-2022-35935: CWE-617: Reachable Assertion in tensorflow tensorflow
Description
TensorFlow is an open source platform for machine learning. The implementation of SobolSampleOp is vulnerable to a denial of service via CHECK-failure (assertion failure) caused by assuming `input(0)`, `input(1)`, and `input(2)` to be scalar. This issue has been patched in GitHub commit c65c67f88ad770662e8f191269a907bf2b94b1bf. The fix will be included in TensorFlow 2.10.0. We will also cherrypick this commit on TensorFlow 2.9.1, TensorFlow 2.8.1, and TensorFlow 2.7.2, as these are also affected and still in supported range. There are no known workarounds for this issue.
AI-Powered Analysis
Technical Analysis
CVE-2022-35935 is a medium-severity vulnerability affecting the TensorFlow machine learning platform, specifically within the SobolSampleOp operation. TensorFlow is widely used for developing and deploying machine learning models. The vulnerability arises from an assumption in the SobolSampleOp implementation that its first three inputs (`input(0)`, `input(1)`, and `input(2)`) are scalar values. This assumption leads to a reachable assertion failure (CWE-617) when the inputs do not meet this condition, causing the program to terminate unexpectedly due to a CHECK-failure. This results in a denial of service (DoS) condition, where the affected TensorFlow process crashes and becomes unavailable. The issue affects multiple TensorFlow versions: all versions prior to 2.7.2, versions from 2.8.0 up to but not including 2.8.1, and versions from 2.9.0 up to but not including 2.9.1. The vulnerability has been patched in commit c65c67f88ad770662e8f191269a907bf2b94b1bf and will be included in TensorFlow 2.10.0, with backported fixes for 2.9.1, 2.8.1, and 2.7.2. There are no known workarounds, and no exploits have been observed in the wild to date. Exploitation requires the attacker to supply crafted inputs to the SobolSampleOp operation, which is typically used in stochastic sampling within TensorFlow models. The vulnerability impacts the availability of TensorFlow-based services or applications by causing crashes, but does not directly compromise confidentiality or integrity. The vulnerability does not require authentication but does require the ability to influence or supply inputs to the affected TensorFlow operation, which may limit exposure depending on deployment context.
Potential Impact
For European organizations, the primary impact of CVE-2022-35935 is a denial of service condition affecting TensorFlow-based machine learning workloads. Organizations relying on TensorFlow for critical AI/ML applications—such as financial institutions using ML for fraud detection, healthcare providers using AI for diagnostics, or manufacturing firms employing predictive maintenance—may experience service interruptions or degraded performance if vulnerable versions are exploited. This can lead to operational disruptions, delayed decision-making, and potential financial losses. Since the vulnerability causes assertion failures leading to crashes, availability is the main concern; confidentiality and integrity are not directly impacted. However, repeated crashes or service downtime could indirectly affect data processing pipelines and business continuity. The lack of known exploits in the wild reduces immediate risk, but the widespread use of TensorFlow in Europe means that unpatched systems remain vulnerable to potential future attacks. Additionally, organizations that expose TensorFlow models via APIs or cloud services may be more exposed if attackers can supply malicious inputs remotely. Given the increasing reliance on AI/ML in European digital transformation initiatives, this vulnerability could impact sectors with high strategic importance, including finance, healthcare, automotive, and public sector services.
Mitigation Recommendations
To mitigate CVE-2022-35935, European organizations should: 1) Identify all TensorFlow deployments and verify the versions in use. Focus on versions prior to 2.7.2, between 2.8.0 and 2.8.1, and between 2.9.0 and 2.9.1, which are vulnerable. 2) Apply the official patches by upgrading to TensorFlow 2.10.0 or later, or to the patched versions 2.9.1, 2.8.1, or 2.7.2 as appropriate. 3) If immediate patching is not feasible, restrict access to TensorFlow model endpoints to trusted users and networks to reduce the risk of malicious input injection. 4) Implement input validation and sanitization at the application layer to ensure that inputs to SobolSampleOp or related TensorFlow operations conform to expected scalar types, where possible. 5) Monitor TensorFlow service logs for unexpected crashes or assertion failures that may indicate attempted exploitation. 6) Incorporate TensorFlow version checks into vulnerability management and patch management workflows to ensure timely updates. 7) For cloud-based TensorFlow services, coordinate with cloud providers to confirm patch status and apply mitigations. 8) Educate development and data science teams about the vulnerability to avoid deploying vulnerable versions in production. These steps go beyond generic advice by emphasizing version-specific patching, input validation, access controls, and operational monitoring tailored to TensorFlow environments.
Affected Countries
For access to advanced analysis and higher rate limits, contact root@offseq.com
Technical Details
- Data Version
- 5.1
- Assigner Short Name
- GitHub_M
- Date Reserved
- 2022-07-15T00:00:00.000Z
- Cisa Enriched
- true
Threat ID: 682d9845c4522896dcbf3fd7
Added to database: 5/21/2025, 9:09:25 AM
Last enriched: 6/22/2025, 8:21:28 PM
Last updated: 10/16/2025, 2:38:03 PM
Views: 21
Community Reviews
0 reviewsCrowdsource mitigation strategies, share intel context, and vote on the most helpful responses. Sign in to add your voice and help keep defenders ahead.
Want to contribute mitigation steps or threat intel context? Sign in or create an account to join the community discussion.
Related Threats
CVE-2025-54658: Escalation of privilege in Fortinet FortiDLP
HighCVE-2025-53951: Escalation of privilege in Fortinet FortiDLP
MediumCVE-2025-53950: Information disclosure in Fortinet FortiDLP
MediumCVE-2025-46752: Information disclosure in Fortinet FortiDLP
MediumCVE-2025-11839: Unchecked Return Value in GNU Binutils
MediumActions
Updates to AI analysis require Pro Console access. Upgrade inside Console → Billing.
External Links
Need enhanced features?
Contact root@offseq.com for Pro access with improved analysis and higher rate limits.