Skip to main content

CVE-2022-35963: CWE-617: Reachable Assertion in tensorflow tensorflow

Medium
Published: Fri Sep 16 2022 (09/16/2022, 20:10:10 UTC)
Source: CVE
Vendor/Project: tensorflow
Product: tensorflow

Description

TensorFlow is an open source platform for machine learning. The implementation of `FractionalAvgPoolGrad` does not fully validate the input `orig_input_tensor_shape`. This results in an overflow that results in a `CHECK` failure which can be used to trigger a denial of service attack. We have patched the issue in GitHub commit 03a659d7be9a1154fdf5eeac221e5950fec07dad. The fix will be included in TensorFlow 2.10.0. We will also cherrypick this commit on TensorFlow 2.9.1, TensorFlow 2.8.1, and TensorFlow 2.7.2, as these are also affected and still in supported range. There are no known workarounds for this issue.

AI-Powered Analysis

AILast updated: 06/22/2025, 20:19:45 UTC

Technical Analysis

CVE-2022-35963 is a medium-severity vulnerability affecting TensorFlow, an open-source machine learning platform widely used for developing and deploying machine learning models. The vulnerability arises from the implementation of the function `FractionalAvgPoolGrad`, which does not adequately validate the input parameter `orig_input_tensor_shape`. This insufficient validation can lead to an integer overflow condition. When this overflow occurs, it triggers a `CHECK` failure, which is an assertion mechanism used internally by TensorFlow to verify assumptions during execution. The failure of this assertion causes the program to terminate unexpectedly, resulting in a denial of service (DoS) condition. This means that an attacker can craft inputs that exploit this vulnerability to crash TensorFlow processes, disrupting machine learning workflows or services relying on TensorFlow. The issue affects multiple TensorFlow versions: all versions prior to 2.7.2, versions between 2.8.0 and 2.8.1, and versions between 2.9.0 and 2.9.1. The vulnerability has been patched in TensorFlow 2.10.0, and backported fixes are available for 2.7.2, 2.8.1, and 2.9.1. No known workarounds exist, and no exploits have been observed in the wild to date. The vulnerability is classified under CWE-617 (Reachable Assertion), indicating that an attacker can trigger an assertion failure by providing crafted inputs. Exploitation does not require authentication or user interaction, but it requires the attacker to have the ability to supply input data to the vulnerable TensorFlow function, which typically occurs in environments where TensorFlow processes untrusted input or is exposed as a service.

Potential Impact

For European organizations, the impact of CVE-2022-35963 primarily involves service availability and operational continuity. Organizations using TensorFlow for critical machine learning workloads—such as financial institutions performing fraud detection, healthcare providers analyzing medical data, or manufacturing firms employing predictive maintenance—may experience unexpected crashes or service interruptions if the vulnerability is exploited. This can lead to downtime, loss of productivity, and potential delays in decision-making processes reliant on machine learning outputs. While the vulnerability does not directly compromise confidentiality or integrity of data, the denial of service could indirectly affect business operations and customer trust. Additionally, organizations that expose TensorFlow-based services to external users or integrate TensorFlow models into web-facing applications are at higher risk, as attackers could remotely trigger the DoS condition. Given the increasing adoption of AI and machine learning across European industries, the disruption caused by this vulnerability could have cascading effects on automated processes and analytics pipelines.

Mitigation Recommendations

To mitigate this vulnerability, European organizations should prioritize upgrading TensorFlow to version 2.10.0 or later, or apply the backported patches available for versions 2.7.2, 2.8.1, and 2.9.1. Since no workarounds exist, patching is the primary defense. Organizations should audit their environments to identify all TensorFlow instances, including development, testing, and production systems. For environments where immediate patching is not feasible, organizations should implement strict input validation and sanitization at the application layer to ensure that inputs to `FractionalAvgPoolGrad` or related TensorFlow functions do not contain malformed or malicious data that could trigger the overflow. Additionally, deploying runtime monitoring and anomaly detection to identify abnormal TensorFlow process crashes can help in early detection of exploitation attempts. Network segmentation and limiting access to TensorFlow services to trusted users and systems can reduce exposure. Finally, organizations should review their incident response plans to include scenarios involving machine learning service disruptions.

Need more detailed analysis?Get Pro

Technical Details

Data Version
5.1
Assigner Short Name
GitHub_M
Date Reserved
2022-07-15T00:00:00.000Z
Cisa Enriched
true

Threat ID: 682d9845c4522896dcbf4025

Added to database: 5/21/2025, 9:09:25 AM

Last enriched: 6/22/2025, 8:19:45 PM

Last updated: 8/15/2025, 7:31:58 AM

Views: 12

Actions

PRO

Updates to AI analysis are available only with a Pro account. Contact root@offseq.com for access.

Please log in to the Console to use AI analysis features.

Need enhanced features?

Contact root@offseq.com for Pro access with improved analysis and higher rate limits.

Latest Threats