CVE-2022-35969: CWE-617: Reachable Assertion in tensorflow tensorflow
TensorFlow is an open source platform for machine learning. The implementation of `Conv2DBackpropInput` requires `input_sizes` to be 4-dimensional. Otherwise, it gives a `CHECK` failure which can be used to trigger a denial of service attack. We have patched the issue in GitHub commit 50156d547b9a1da0144d7babe665cf690305b33c. The fix will be included in TensorFlow 2.10.0. We will also cherrypick this commit on TensorFlow 2.9.1, TensorFlow 2.8.1, and TensorFlow 2.7.2, as these are also affected and still in supported range. There are no known workarounds for this issue.
AI Analysis
Technical Summary
CVE-2022-35969 is a medium-severity vulnerability identified in TensorFlow, an open-source machine learning platform widely used for developing and deploying machine learning models. The vulnerability arises from the implementation of the Conv2DBackpropInput operation, which expects the input_sizes parameter to be strictly 4-dimensional. If this condition is not met, the system triggers a CHECK failure, which is essentially a reachable assertion failure. This assertion failure can be exploited to cause a denial of service (DoS) by crashing the TensorFlow process. The issue affects multiple TensorFlow versions: all versions prior to 2.7.2, versions between 2.8.0 and 2.8.1, and versions between 2.9.0 and 2.9.1. The vulnerability was patched in GitHub commit 50156d547b9a1da0144d7babe665cf690305b33c and the fix is included starting from TensorFlow 2.10.0, with backports planned for 2.9.1, 2.8.1, and 2.7.2. No known workarounds exist, and no exploits have been observed in the wild to date. The vulnerability is categorized under CWE-617 (Reachable Assertion), indicating that the assertion failure can be triggered by crafted input, leading to a crash. The attack vector requires supplying malformed input to the Conv2DBackpropInput function, which is typically invoked during model training or inference involving convolutional neural networks. Since this is a denial of service vulnerability, it impacts availability but does not directly compromise confidentiality or integrity. Exploitation does not require authentication if the TensorFlow service is exposed to untrusted inputs, but user interaction is needed to supply the malformed input. The scope is limited to systems running vulnerable TensorFlow versions, which are commonly found in research, development, and production environments using machine learning workloads.
Potential Impact
For European organizations, the primary impact of CVE-2022-35969 is the potential disruption of machine learning services due to denial of service conditions. Organizations relying on TensorFlow for critical AI-driven applications—such as financial institutions using ML for fraud detection, healthcare providers employing AI for diagnostics, or manufacturing firms leveraging AI for predictive maintenance—may experience service outages or degraded performance. This can lead to operational downtime, loss of productivity, and potential financial losses. While the vulnerability does not allow for data breaches or unauthorized code execution, the availability impact can indirectly affect business continuity and service reliability. Additionally, organizations with exposed TensorFlow-based APIs or services that accept external inputs are at higher risk. Given the increasing adoption of AI and ML in Europe, especially in sectors like automotive, finance, and healthcare, the disruption caused by this vulnerability could have cascading effects on dependent systems and services. However, since no known exploits exist in the wild and the vulnerability requires specific malformed input, the immediate risk is moderate. The lack of workarounds means patching is the only effective mitigation, emphasizing the need for timely updates.
Mitigation Recommendations
1. Immediate patching: Upgrade TensorFlow installations to version 2.10.0 or later, or apply the backported patches for versions 2.7.2, 2.8.1, and 2.9.1 as soon as they become available. 2. Input validation: Implement strict input validation and sanitization on all inputs to TensorFlow services, especially those invoking Conv2DBackpropInput, to ensure input_sizes parameters are correctly dimensioned before processing. 3. Network segmentation: Isolate TensorFlow services from untrusted networks to reduce exposure to potentially malicious inputs. 4. Monitoring and alerting: Deploy monitoring to detect abnormal crashes or service interruptions in TensorFlow components, enabling rapid incident response. 5. Access controls: Restrict access to TensorFlow APIs and services to trusted users and systems only, minimizing the attack surface. 6. Use containerization or sandboxing: Run TensorFlow workloads in isolated environments to limit the impact of potential crashes on the broader system. 7. Review and harden ML pipelines: Audit machine learning pipelines to identify where Conv2DBackpropInput is used and ensure robust error handling is in place to gracefully manage assertion failures.
Affected Countries
Germany, France, United Kingdom, Netherlands, Sweden, Finland, Italy, Spain, Poland, Belgium
CVE-2022-35969: CWE-617: Reachable Assertion in tensorflow tensorflow
Description
TensorFlow is an open source platform for machine learning. The implementation of `Conv2DBackpropInput` requires `input_sizes` to be 4-dimensional. Otherwise, it gives a `CHECK` failure which can be used to trigger a denial of service attack. We have patched the issue in GitHub commit 50156d547b9a1da0144d7babe665cf690305b33c. The fix will be included in TensorFlow 2.10.0. We will also cherrypick this commit on TensorFlow 2.9.1, TensorFlow 2.8.1, and TensorFlow 2.7.2, as these are also affected and still in supported range. There are no known workarounds for this issue.
AI-Powered Analysis
Technical Analysis
CVE-2022-35969 is a medium-severity vulnerability identified in TensorFlow, an open-source machine learning platform widely used for developing and deploying machine learning models. The vulnerability arises from the implementation of the Conv2DBackpropInput operation, which expects the input_sizes parameter to be strictly 4-dimensional. If this condition is not met, the system triggers a CHECK failure, which is essentially a reachable assertion failure. This assertion failure can be exploited to cause a denial of service (DoS) by crashing the TensorFlow process. The issue affects multiple TensorFlow versions: all versions prior to 2.7.2, versions between 2.8.0 and 2.8.1, and versions between 2.9.0 and 2.9.1. The vulnerability was patched in GitHub commit 50156d547b9a1da0144d7babe665cf690305b33c and the fix is included starting from TensorFlow 2.10.0, with backports planned for 2.9.1, 2.8.1, and 2.7.2. No known workarounds exist, and no exploits have been observed in the wild to date. The vulnerability is categorized under CWE-617 (Reachable Assertion), indicating that the assertion failure can be triggered by crafted input, leading to a crash. The attack vector requires supplying malformed input to the Conv2DBackpropInput function, which is typically invoked during model training or inference involving convolutional neural networks. Since this is a denial of service vulnerability, it impacts availability but does not directly compromise confidentiality or integrity. Exploitation does not require authentication if the TensorFlow service is exposed to untrusted inputs, but user interaction is needed to supply the malformed input. The scope is limited to systems running vulnerable TensorFlow versions, which are commonly found in research, development, and production environments using machine learning workloads.
Potential Impact
For European organizations, the primary impact of CVE-2022-35969 is the potential disruption of machine learning services due to denial of service conditions. Organizations relying on TensorFlow for critical AI-driven applications—such as financial institutions using ML for fraud detection, healthcare providers employing AI for diagnostics, or manufacturing firms leveraging AI for predictive maintenance—may experience service outages or degraded performance. This can lead to operational downtime, loss of productivity, and potential financial losses. While the vulnerability does not allow for data breaches or unauthorized code execution, the availability impact can indirectly affect business continuity and service reliability. Additionally, organizations with exposed TensorFlow-based APIs or services that accept external inputs are at higher risk. Given the increasing adoption of AI and ML in Europe, especially in sectors like automotive, finance, and healthcare, the disruption caused by this vulnerability could have cascading effects on dependent systems and services. However, since no known exploits exist in the wild and the vulnerability requires specific malformed input, the immediate risk is moderate. The lack of workarounds means patching is the only effective mitigation, emphasizing the need for timely updates.
Mitigation Recommendations
1. Immediate patching: Upgrade TensorFlow installations to version 2.10.0 or later, or apply the backported patches for versions 2.7.2, 2.8.1, and 2.9.1 as soon as they become available. 2. Input validation: Implement strict input validation and sanitization on all inputs to TensorFlow services, especially those invoking Conv2DBackpropInput, to ensure input_sizes parameters are correctly dimensioned before processing. 3. Network segmentation: Isolate TensorFlow services from untrusted networks to reduce exposure to potentially malicious inputs. 4. Monitoring and alerting: Deploy monitoring to detect abnormal crashes or service interruptions in TensorFlow components, enabling rapid incident response. 5. Access controls: Restrict access to TensorFlow APIs and services to trusted users and systems only, minimizing the attack surface. 6. Use containerization or sandboxing: Run TensorFlow workloads in isolated environments to limit the impact of potential crashes on the broader system. 7. Review and harden ML pipelines: Audit machine learning pipelines to identify where Conv2DBackpropInput is used and ensure robust error handling is in place to gracefully manage assertion failures.
For access to advanced analysis and higher rate limits, contact root@offseq.com
Technical Details
- Data Version
- 5.1
- Assigner Short Name
- GitHub_M
- Date Reserved
- 2022-07-15T00:00:00.000Z
- Cisa Enriched
- true
Threat ID: 682d9845c4522896dcbf406b
Added to database: 5/21/2025, 9:09:25 AM
Last enriched: 6/22/2025, 8:05:50 PM
Last updated: 8/14/2025, 12:53:31 AM
Views: 13
Related Threats
CVE-2025-9091: Hard-coded Credentials in Tenda AC20
LowCVE-2025-9090: Command Injection in Tenda AC20
MediumCVE-2025-9092: CWE-400 Uncontrolled Resource Consumption in Legion of the Bouncy Castle Inc. Bouncy Castle for Java - BC-FJA 2.1.0
LowCVE-2025-9089: Stack-based Buffer Overflow in Tenda AC20
HighCVE-2025-9088: Stack-based Buffer Overflow in Tenda AC20
HighActions
Updates to AI analysis are available only with a Pro account. Contact root@offseq.com for access.
External Links
Need enhanced features?
Contact root@offseq.com for Pro access with improved analysis and higher rate limits.