Skip to main content

CVE-2022-35959: CWE-617: Reachable Assertion in tensorflow tensorflow

Medium
Published: Fri Sep 16 2022 (09/16/2022, 19:55:11 UTC)
Source: CVE
Vendor/Project: tensorflow
Product: tensorflow

Description

TensorFlow is an open source platform for machine learning. The implementation of `AvgPool3DGradOp` does not fully validate the input `orig_input_shape`. This results in an overflow that results in a `CHECK` failure which can be used to trigger a denial of service attack. We have patched the issue in GitHub commit 9178ac9d6389bdc54638ab913ea0e419234d14eb. The fix will be included in TensorFlow 2.10.0. We will also cherrypick this commit on TensorFlow 2.9.1, TensorFlow 2.8.1, and TensorFlow 2.7.2, as these are also affected and still in supported range. There are no known workarounds for this issue.

AI-Powered Analysis

AILast updated: 06/22/2025, 20:20:06 UTC

Technical Analysis

CVE-2022-35959 is a vulnerability in TensorFlow, an open-source machine learning platform widely used for developing and deploying machine learning models. The flaw exists in the implementation of the AvgPool3DGradOp operation, which is responsible for computing gradients during the backpropagation phase of 3D average pooling layers. Specifically, the vulnerability arises because the input parameter orig_input_shape is not fully validated, leading to an integer overflow. This overflow triggers a CHECK failure, which is an assertion mechanism used internally by TensorFlow to verify assumptions during execution. When this assertion fails, it causes the process to terminate abruptly, resulting in a denial of service (DoS) condition. The vulnerability affects TensorFlow versions prior to 2.7.2, as well as specific minor versions 2.8.0 to 2.8.1 and 2.9.0 to 2.9.1. The issue has been patched in TensorFlow 2.10.0 and backported to supported versions 2.7.2, 2.8.1, and 2.9.1. No known workarounds exist, and no exploits have been observed in the wild to date. The vulnerability is classified under CWE-617 (Reachable Assertion), indicating that an attacker can trigger an assertion failure that leads to process termination. The attack vector requires supplying crafted input data to the vulnerable operation, which could be feasible in environments where untrusted data is processed by TensorFlow models. The impact is limited to denial of service, with no indication of code execution or data corruption. The vulnerability does not require authentication but does require the attacker to influence the input data processed by TensorFlow.

Potential Impact

For European organizations leveraging TensorFlow in their machine learning pipelines, this vulnerability poses a risk of service disruption. Organizations using TensorFlow for critical applications such as healthcare diagnostics, financial modeling, or industrial automation could experience outages or degraded service availability if an attacker supplies malicious input triggering the assertion failure. Since TensorFlow is often integrated into larger systems, a denial of service in the ML component could cascade, impacting dependent services or delaying critical decision-making processes. The vulnerability does not appear to compromise data confidentiality or integrity directly, but availability impacts could affect operational continuity and reliability. Given the absence of known exploits, the immediate risk is moderate; however, organizations processing untrusted or external data streams with TensorFlow should be particularly cautious. The lack of workarounds means patching is the primary mitigation strategy. Failure to patch could leave systems vulnerable to targeted DoS attacks, especially in environments exposed to external inputs or multi-tenant cloud deployments where adversaries might attempt to disrupt services.

Mitigation Recommendations

1. Immediate upgrade to TensorFlow versions 2.7.2, 2.8.1, 2.9.1, or later (including 2.10.0) that contain the patch for CVE-2022-35959. 2. Implement strict input validation and sanitization on all data fed into TensorFlow models, especially for 3D average pooling operations, to reduce the risk of malformed inputs triggering the vulnerability. 3. Employ runtime monitoring and anomaly detection to identify unexpected TensorFlow process terminations or assertion failures, enabling rapid incident response. 4. For cloud or containerized deployments, use orchestration tools to automatically restart TensorFlow services upon failure to minimize downtime. 5. Isolate TensorFlow workloads processing untrusted data in sandboxed or restricted environments to limit the blast radius of potential DoS attacks. 6. Review and harden access controls to TensorFlow model endpoints to prevent unauthorized or malicious input submissions. 7. Maintain an up-to-date inventory of TensorFlow versions deployed across the organization to ensure timely patch management. 8. Engage with TensorFlow community and security advisories to stay informed about any emerging exploits or additional mitigations.

Need more detailed analysis?Get Pro

Technical Details

Data Version
5.1
Assigner Short Name
GitHub_M
Date Reserved
2022-07-15T00:00:00.000Z
Cisa Enriched
true

Threat ID: 682d9845c4522896dcbf4010

Added to database: 5/21/2025, 9:09:25 AM

Last enriched: 6/22/2025, 8:20:06 PM

Last updated: 8/16/2025, 5:08:38 AM

Views: 11

Actions

PRO

Updates to AI analysis are available only with a Pro account. Contact root@offseq.com for access.

Please log in to the Console to use AI analysis features.

Need enhanced features?

Contact root@offseq.com for Pro access with improved analysis and higher rate limits.

Latest Threats