Skip to main content

CVE-2022-35960: CWE-617: Reachable Assertion in tensorflow tensorflow

Medium
Published: Fri Sep 16 2022 (09/16/2022, 20:00:15 UTC)
Source: CVE
Vendor/Project: tensorflow
Product: tensorflow

Description

TensorFlow is an open source platform for machine learning. In `core/kernels/list_kernels.cc's TensorListReserve`, `num_elements` is assumed to be a tensor of size 1. When a `num_elements` of more than 1 element is provided, then `tf.raw_ops.TensorListReserve` fails the `CHECK_EQ` in `CheckIsAlignedAndSingleElement`. We have patched the issue in GitHub commit b5f6fbfba76576202b72119897561e3bd4f179c7. The fix will be included in TensorFlow 2.10.0. We will also cherrypick this commit on TensorFlow 2.9.1, TensorFlow 2.8.1, and TensorFlow 2.7.2, as these are also affected and still in supported range. There are no known workarounds for this issue.

AI-Powered Analysis

AILast updated: 06/22/2025, 20:19:56 UTC

Technical Analysis

CVE-2022-35960 is a medium-severity vulnerability in TensorFlow, an open-source machine learning platform widely used for developing and deploying AI models. The vulnerability resides in the TensorListReserve operation within the core/kernels/list_kernels.cc source file. Specifically, the function assumes that the input tensor 'num_elements' has exactly one element. However, if 'num_elements' contains more than one element, the CHECK_EQ assertion in the CheckIsAlignedAndSingleElement function fails, causing a reachable assertion failure. This means that an attacker who can supply crafted input to TensorListReserve can trigger a denial-of-service (DoS) condition by crashing the TensorFlow process. The issue affects multiple TensorFlow versions: all versions prior to 2.7.2, versions between 2.8.0 and 2.8.1, and versions between 2.9.0 and 2.9.1. The vulnerability was patched in GitHub commit b5f6fbfba76576202b72119897561e3bd4f179c7 and the fix is included in TensorFlow 2.10.0, with backports planned for 2.7.2, 2.8.1, and 2.9.1. There are no known workarounds for this issue, and no exploits have been observed in the wild. The vulnerability is classified under CWE-617 (Reachable Assertion), indicating that the assertion failure can be triggered by external input, leading to process termination. Exploitation requires the ability to provide malicious input to the TensorListReserve API, which is typically used internally or via TensorFlow's raw operations interface. This vulnerability primarily impacts the availability of TensorFlow-based services by causing crashes, but does not directly compromise confidentiality or integrity. Given TensorFlow's widespread use in AI workloads, especially in research, industry, and cloud environments, this vulnerability could disrupt machine learning pipelines if exploited.

Potential Impact

For European organizations, the impact of CVE-2022-35960 centers on availability disruption of AI and machine learning services that rely on vulnerable TensorFlow versions. Organizations in sectors such as finance, healthcare, automotive, and manufacturing increasingly depend on AI models for critical operations, predictive analytics, and automation. A denial-of-service triggered by this vulnerability could interrupt these services, leading to operational delays, reduced productivity, and potential financial losses. Cloud service providers hosting AI workloads could also be affected, impacting multiple tenants. Although the vulnerability does not allow code execution or data leakage, the forced termination of TensorFlow processes could degrade service reliability and trust. Furthermore, organizations using TensorFlow in edge devices or embedded systems might face challenges in remote patching, increasing exposure duration. The lack of known exploits reduces immediate risk, but the absence of workarounds means that unpatched systems remain vulnerable to accidental or malicious crashes. Given the increasing regulatory focus on AI reliability and operational resilience in Europe, such disruptions could also have compliance implications.

Mitigation Recommendations

To mitigate CVE-2022-35960, European organizations should prioritize upgrading TensorFlow to version 2.10.0 or later, or apply the backported patches for versions 2.7.2, 2.8.1, and 2.9.1 as soon as possible. Since no workarounds exist, patching is the primary defense. Organizations should audit their AI pipelines and software inventories to identify TensorFlow versions in use, including indirect dependencies in container images and cloud environments. Implementing input validation and sanitization at the application layer before invoking TensorFlow raw operations can reduce the risk of malformed inputs triggering the assertion. Monitoring TensorFlow process stability and setting up automated restarts or failover mechanisms can help maintain availability in case of crashes. For cloud deployments, leveraging managed AI services that promptly apply security updates can reduce exposure. Additionally, organizations should review access controls to limit who can supply inputs to TensorFlow APIs, reducing the attack surface. Finally, integrating this vulnerability into vulnerability management and incident response plans ensures timely detection and remediation.

Need more detailed analysis?Get Pro

Technical Details

Data Version
5.1
Assigner Short Name
GitHub_M
Date Reserved
2022-07-15T00:00:00.000Z
Cisa Enriched
true

Threat ID: 682d9845c4522896dcbf4021

Added to database: 5/21/2025, 9:09:25 AM

Last enriched: 6/22/2025, 8:19:56 PM

Last updated: 8/16/2025, 5:21:14 PM

Views: 16

Actions

PRO

Updates to AI analysis are available only with a Pro account. Contact root@offseq.com for access.

Please log in to the Console to use AI analysis features.

Need enhanced features?

Contact root@offseq.com for Pro access with improved analysis and higher rate limits.

Latest Threats