CVE-2022-35963: CWE-617: Reachable Assertion in tensorflow tensorflow
TensorFlow is an open source platform for machine learning. The implementation of `FractionalAvgPoolGrad` does not fully validate the input `orig_input_tensor_shape`. This results in an overflow that results in a `CHECK` failure which can be used to trigger a denial of service attack. We have patched the issue in GitHub commit 03a659d7be9a1154fdf5eeac221e5950fec07dad. The fix will be included in TensorFlow 2.10.0. We will also cherrypick this commit on TensorFlow 2.9.1, TensorFlow 2.8.1, and TensorFlow 2.7.2, as these are also affected and still in supported range. There are no known workarounds for this issue.
AI Analysis
Technical Summary
CVE-2022-35963 is a medium-severity vulnerability affecting TensorFlow, an open-source machine learning platform widely used for developing and deploying machine learning models. The vulnerability arises from the implementation of the function `FractionalAvgPoolGrad`, which does not adequately validate the input parameter `orig_input_tensor_shape`. This insufficient validation can lead to an integer overflow condition. When this overflow occurs, it triggers a `CHECK` failure, which is an assertion mechanism used internally by TensorFlow to verify assumptions during execution. The failure of this assertion causes the program to terminate unexpectedly, resulting in a denial of service (DoS) condition. This means that an attacker can craft inputs that exploit this vulnerability to crash TensorFlow processes, disrupting machine learning workflows or services relying on TensorFlow. The issue affects multiple TensorFlow versions: all versions prior to 2.7.2, versions between 2.8.0 and 2.8.1, and versions between 2.9.0 and 2.9.1. The vulnerability has been patched in TensorFlow 2.10.0, and backported fixes are available for 2.7.2, 2.8.1, and 2.9.1. No known workarounds exist, and no exploits have been observed in the wild to date. The vulnerability is classified under CWE-617 (Reachable Assertion), indicating that an attacker can trigger an assertion failure by providing crafted inputs. Exploitation does not require authentication or user interaction, but it requires the attacker to have the ability to supply input data to the vulnerable TensorFlow function, which typically occurs in environments where TensorFlow processes untrusted input or is exposed as a service.
Potential Impact
For European organizations, the impact of CVE-2022-35963 primarily involves service availability and operational continuity. Organizations using TensorFlow for critical machine learning workloads—such as financial institutions performing fraud detection, healthcare providers analyzing medical data, or manufacturing firms employing predictive maintenance—may experience unexpected crashes or service interruptions if the vulnerability is exploited. This can lead to downtime, loss of productivity, and potential delays in decision-making processes reliant on machine learning outputs. While the vulnerability does not directly compromise confidentiality or integrity of data, the denial of service could indirectly affect business operations and customer trust. Additionally, organizations that expose TensorFlow-based services to external users or integrate TensorFlow models into web-facing applications are at higher risk, as attackers could remotely trigger the DoS condition. Given the increasing adoption of AI and machine learning across European industries, the disruption caused by this vulnerability could have cascading effects on automated processes and analytics pipelines.
Mitigation Recommendations
To mitigate this vulnerability, European organizations should prioritize upgrading TensorFlow to version 2.10.0 or later, or apply the backported patches available for versions 2.7.2, 2.8.1, and 2.9.1. Since no workarounds exist, patching is the primary defense. Organizations should audit their environments to identify all TensorFlow instances, including development, testing, and production systems. For environments where immediate patching is not feasible, organizations should implement strict input validation and sanitization at the application layer to ensure that inputs to `FractionalAvgPoolGrad` or related TensorFlow functions do not contain malformed or malicious data that could trigger the overflow. Additionally, deploying runtime monitoring and anomaly detection to identify abnormal TensorFlow process crashes can help in early detection of exploitation attempts. Network segmentation and limiting access to TensorFlow services to trusted users and systems can reduce exposure. Finally, organizations should review their incident response plans to include scenarios involving machine learning service disruptions.
Affected Countries
Germany, France, United Kingdom, Netherlands, Sweden, Finland, Italy, Spain, Belgium, Poland
CVE-2022-35963: CWE-617: Reachable Assertion in tensorflow tensorflow
Description
TensorFlow is an open source platform for machine learning. The implementation of `FractionalAvgPoolGrad` does not fully validate the input `orig_input_tensor_shape`. This results in an overflow that results in a `CHECK` failure which can be used to trigger a denial of service attack. We have patched the issue in GitHub commit 03a659d7be9a1154fdf5eeac221e5950fec07dad. The fix will be included in TensorFlow 2.10.0. We will also cherrypick this commit on TensorFlow 2.9.1, TensorFlow 2.8.1, and TensorFlow 2.7.2, as these are also affected and still in supported range. There are no known workarounds for this issue.
AI-Powered Analysis
Technical Analysis
CVE-2022-35963 is a medium-severity vulnerability affecting TensorFlow, an open-source machine learning platform widely used for developing and deploying machine learning models. The vulnerability arises from the implementation of the function `FractionalAvgPoolGrad`, which does not adequately validate the input parameter `orig_input_tensor_shape`. This insufficient validation can lead to an integer overflow condition. When this overflow occurs, it triggers a `CHECK` failure, which is an assertion mechanism used internally by TensorFlow to verify assumptions during execution. The failure of this assertion causes the program to terminate unexpectedly, resulting in a denial of service (DoS) condition. This means that an attacker can craft inputs that exploit this vulnerability to crash TensorFlow processes, disrupting machine learning workflows or services relying on TensorFlow. The issue affects multiple TensorFlow versions: all versions prior to 2.7.2, versions between 2.8.0 and 2.8.1, and versions between 2.9.0 and 2.9.1. The vulnerability has been patched in TensorFlow 2.10.0, and backported fixes are available for 2.7.2, 2.8.1, and 2.9.1. No known workarounds exist, and no exploits have been observed in the wild to date. The vulnerability is classified under CWE-617 (Reachable Assertion), indicating that an attacker can trigger an assertion failure by providing crafted inputs. Exploitation does not require authentication or user interaction, but it requires the attacker to have the ability to supply input data to the vulnerable TensorFlow function, which typically occurs in environments where TensorFlow processes untrusted input or is exposed as a service.
Potential Impact
For European organizations, the impact of CVE-2022-35963 primarily involves service availability and operational continuity. Organizations using TensorFlow for critical machine learning workloads—such as financial institutions performing fraud detection, healthcare providers analyzing medical data, or manufacturing firms employing predictive maintenance—may experience unexpected crashes or service interruptions if the vulnerability is exploited. This can lead to downtime, loss of productivity, and potential delays in decision-making processes reliant on machine learning outputs. While the vulnerability does not directly compromise confidentiality or integrity of data, the denial of service could indirectly affect business operations and customer trust. Additionally, organizations that expose TensorFlow-based services to external users or integrate TensorFlow models into web-facing applications are at higher risk, as attackers could remotely trigger the DoS condition. Given the increasing adoption of AI and machine learning across European industries, the disruption caused by this vulnerability could have cascading effects on automated processes and analytics pipelines.
Mitigation Recommendations
To mitigate this vulnerability, European organizations should prioritize upgrading TensorFlow to version 2.10.0 or later, or apply the backported patches available for versions 2.7.2, 2.8.1, and 2.9.1. Since no workarounds exist, patching is the primary defense. Organizations should audit their environments to identify all TensorFlow instances, including development, testing, and production systems. For environments where immediate patching is not feasible, organizations should implement strict input validation and sanitization at the application layer to ensure that inputs to `FractionalAvgPoolGrad` or related TensorFlow functions do not contain malformed or malicious data that could trigger the overflow. Additionally, deploying runtime monitoring and anomaly detection to identify abnormal TensorFlow process crashes can help in early detection of exploitation attempts. Network segmentation and limiting access to TensorFlow services to trusted users and systems can reduce exposure. Finally, organizations should review their incident response plans to include scenarios involving machine learning service disruptions.
For access to advanced analysis and higher rate limits, contact root@offseq.com
Technical Details
- Data Version
- 5.1
- Assigner Short Name
- GitHub_M
- Date Reserved
- 2022-07-15T00:00:00.000Z
- Cisa Enriched
- true
Threat ID: 682d9845c4522896dcbf4025
Added to database: 5/21/2025, 9:09:25 AM
Last enriched: 6/22/2025, 8:19:45 PM
Last updated: 8/15/2025, 7:31:58 AM
Views: 12
Related Threats
CVE-2025-53948: CWE-415 Double Free in Santesoft Sante PACS Server
HighCVE-2025-52584: CWE-122 Heap-based Buffer Overflow in Ashlar-Vellum Cobalt
HighCVE-2025-46269: CWE-122 Heap-based Buffer Overflow in Ashlar-Vellum Cobalt
HighCVE-2025-54862: CWE-79 Improper Neutralization of Input During Web Page Generation (XSS or 'Cross-site Scripting') in Santesoft Sante PACS Server
MediumCVE-2025-54759: CWE-79 Improper Neutralization of Input During Web Page Generation (XSS or 'Cross-site Scripting') in Santesoft Sante PACS Server
MediumActions
Updates to AI analysis are available only with a Pro account. Contact root@offseq.com for access.
External Links
Need enhanced features?
Contact root@offseq.com for Pro access with improved analysis and higher rate limits.