CVE-2022-35963: CWE-617: Reachable Assertion in tensorflow tensorflow
TensorFlow is an open source platform for machine learning. The implementation of `FractionalAvgPoolGrad` does not fully validate the input `orig_input_tensor_shape`. This results in an overflow that results in a `CHECK` failure which can be used to trigger a denial of service attack. We have patched the issue in GitHub commit 03a659d7be9a1154fdf5eeac221e5950fec07dad. The fix will be included in TensorFlow 2.10.0. We will also cherrypick this commit on TensorFlow 2.9.1, TensorFlow 2.8.1, and TensorFlow 2.7.2, as these are also affected and still in supported range. There are no known workarounds for this issue.
AI Analysis
Technical Summary
CVE-2022-35963 is a medium-severity vulnerability affecting TensorFlow, an open-source machine learning platform widely used for developing and deploying machine learning models. The vulnerability arises from the implementation of the function `FractionalAvgPoolGrad`, which does not adequately validate the input parameter `orig_input_tensor_shape`. This insufficient validation can lead to an integer overflow condition. When this overflow occurs, it triggers a `CHECK` failure, which is an assertion mechanism used internally by TensorFlow to verify assumptions during execution. The failure of this assertion causes the program to terminate unexpectedly, resulting in a denial of service (DoS) condition. This means that an attacker can craft inputs that exploit this vulnerability to crash TensorFlow processes, disrupting machine learning workflows or services relying on TensorFlow. The issue affects multiple TensorFlow versions: all versions prior to 2.7.2, versions between 2.8.0 and 2.8.1, and versions between 2.9.0 and 2.9.1. The vulnerability has been patched in TensorFlow 2.10.0, and backported fixes are available for 2.7.2, 2.8.1, and 2.9.1. No known workarounds exist, and no exploits have been observed in the wild to date. The vulnerability is classified under CWE-617 (Reachable Assertion), indicating that an attacker can trigger an assertion failure by providing crafted inputs. Exploitation does not require authentication or user interaction, but it requires the attacker to have the ability to supply input data to the vulnerable TensorFlow function, which typically occurs in environments where TensorFlow processes untrusted input or is exposed as a service.
Potential Impact
For European organizations, the impact of CVE-2022-35963 primarily involves service availability and operational continuity. Organizations using TensorFlow for critical machine learning workloads—such as financial institutions performing fraud detection, healthcare providers analyzing medical data, or manufacturing firms employing predictive maintenance—may experience unexpected crashes or service interruptions if the vulnerability is exploited. This can lead to downtime, loss of productivity, and potential delays in decision-making processes reliant on machine learning outputs. While the vulnerability does not directly compromise confidentiality or integrity of data, the denial of service could indirectly affect business operations and customer trust. Additionally, organizations that expose TensorFlow-based services to external users or integrate TensorFlow models into web-facing applications are at higher risk, as attackers could remotely trigger the DoS condition. Given the increasing adoption of AI and machine learning across European industries, the disruption caused by this vulnerability could have cascading effects on automated processes and analytics pipelines.
Mitigation Recommendations
To mitigate this vulnerability, European organizations should prioritize upgrading TensorFlow to version 2.10.0 or later, or apply the backported patches available for versions 2.7.2, 2.8.1, and 2.9.1. Since no workarounds exist, patching is the primary defense. Organizations should audit their environments to identify all TensorFlow instances, including development, testing, and production systems. For environments where immediate patching is not feasible, organizations should implement strict input validation and sanitization at the application layer to ensure that inputs to `FractionalAvgPoolGrad` or related TensorFlow functions do not contain malformed or malicious data that could trigger the overflow. Additionally, deploying runtime monitoring and anomaly detection to identify abnormal TensorFlow process crashes can help in early detection of exploitation attempts. Network segmentation and limiting access to TensorFlow services to trusted users and systems can reduce exposure. Finally, organizations should review their incident response plans to include scenarios involving machine learning service disruptions.
Affected Countries
Germany, France, United Kingdom, Netherlands, Sweden, Finland, Italy, Spain, Belgium, Poland
CVE-2022-35963: CWE-617: Reachable Assertion in tensorflow tensorflow
Description
TensorFlow is an open source platform for machine learning. The implementation of `FractionalAvgPoolGrad` does not fully validate the input `orig_input_tensor_shape`. This results in an overflow that results in a `CHECK` failure which can be used to trigger a denial of service attack. We have patched the issue in GitHub commit 03a659d7be9a1154fdf5eeac221e5950fec07dad. The fix will be included in TensorFlow 2.10.0. We will also cherrypick this commit on TensorFlow 2.9.1, TensorFlow 2.8.1, and TensorFlow 2.7.2, as these are also affected and still in supported range. There are no known workarounds for this issue.
AI-Powered Analysis
Technical Analysis
CVE-2022-35963 is a medium-severity vulnerability affecting TensorFlow, an open-source machine learning platform widely used for developing and deploying machine learning models. The vulnerability arises from the implementation of the function `FractionalAvgPoolGrad`, which does not adequately validate the input parameter `orig_input_tensor_shape`. This insufficient validation can lead to an integer overflow condition. When this overflow occurs, it triggers a `CHECK` failure, which is an assertion mechanism used internally by TensorFlow to verify assumptions during execution. The failure of this assertion causes the program to terminate unexpectedly, resulting in a denial of service (DoS) condition. This means that an attacker can craft inputs that exploit this vulnerability to crash TensorFlow processes, disrupting machine learning workflows or services relying on TensorFlow. The issue affects multiple TensorFlow versions: all versions prior to 2.7.2, versions between 2.8.0 and 2.8.1, and versions between 2.9.0 and 2.9.1. The vulnerability has been patched in TensorFlow 2.10.0, and backported fixes are available for 2.7.2, 2.8.1, and 2.9.1. No known workarounds exist, and no exploits have been observed in the wild to date. The vulnerability is classified under CWE-617 (Reachable Assertion), indicating that an attacker can trigger an assertion failure by providing crafted inputs. Exploitation does not require authentication or user interaction, but it requires the attacker to have the ability to supply input data to the vulnerable TensorFlow function, which typically occurs in environments where TensorFlow processes untrusted input or is exposed as a service.
Potential Impact
For European organizations, the impact of CVE-2022-35963 primarily involves service availability and operational continuity. Organizations using TensorFlow for critical machine learning workloads—such as financial institutions performing fraud detection, healthcare providers analyzing medical data, or manufacturing firms employing predictive maintenance—may experience unexpected crashes or service interruptions if the vulnerability is exploited. This can lead to downtime, loss of productivity, and potential delays in decision-making processes reliant on machine learning outputs. While the vulnerability does not directly compromise confidentiality or integrity of data, the denial of service could indirectly affect business operations and customer trust. Additionally, organizations that expose TensorFlow-based services to external users or integrate TensorFlow models into web-facing applications are at higher risk, as attackers could remotely trigger the DoS condition. Given the increasing adoption of AI and machine learning across European industries, the disruption caused by this vulnerability could have cascading effects on automated processes and analytics pipelines.
Mitigation Recommendations
To mitigate this vulnerability, European organizations should prioritize upgrading TensorFlow to version 2.10.0 or later, or apply the backported patches available for versions 2.7.2, 2.8.1, and 2.9.1. Since no workarounds exist, patching is the primary defense. Organizations should audit their environments to identify all TensorFlow instances, including development, testing, and production systems. For environments where immediate patching is not feasible, organizations should implement strict input validation and sanitization at the application layer to ensure that inputs to `FractionalAvgPoolGrad` or related TensorFlow functions do not contain malformed or malicious data that could trigger the overflow. Additionally, deploying runtime monitoring and anomaly detection to identify abnormal TensorFlow process crashes can help in early detection of exploitation attempts. Network segmentation and limiting access to TensorFlow services to trusted users and systems can reduce exposure. Finally, organizations should review their incident response plans to include scenarios involving machine learning service disruptions.
For access to advanced analysis and higher rate limits, contact root@offseq.com
Technical Details
- Data Version
- 5.1
- Assigner Short Name
- GitHub_M
- Date Reserved
- 2022-07-15T00:00:00.000Z
- Cisa Enriched
- true
Threat ID: 682d9845c4522896dcbf4025
Added to database: 5/21/2025, 9:09:25 AM
Last enriched: 6/22/2025, 8:19:45 PM
Last updated: 10/15/2025, 11:21:45 PM
Views: 21
Community Reviews
0 reviewsCrowdsource mitigation strategies, share intel context, and vote on the most helpful responses. Sign in to add your voice and help keep defenders ahead.
Want to contribute mitigation steps or threat intel context? Sign in or create an account to join the community discussion.
Related Threats
CVE-2025-11619: CWE-295 Improper Certificate Validation in Devolutions Devolutions Server
HighCVE-2025-43313: An app may be able to access sensitive user data in Apple macOS
MediumCVE-2025-43282: An app may be able to cause unexpected system termination in Apple iPadOS
MediumCVE-2025-43281: A local attacker may be able to elevate their privileges in Apple macOS
UnknownCVE-2025-43280: Forwarding an email could display remote images in Mail in Lockdown Mode in Apple iOS and iPadOS
UnknownActions
Updates to AI analysis require Pro Console access. Upgrade inside Console → Billing.
External Links
Need enhanced features?
Contact root@offseq.com for Pro access with improved analysis and higher rate limits.