CVE-2022-35981: CWE-617: Reachable Assertion in tensorflow tensorflow
TensorFlow is an open source platform for machine learning. `FractionalMaxPoolGrad` validates its inputs with `CHECK` failures instead of with returning errors. If it gets incorrectly sized inputs, the `CHECK` failure can be used to trigger a denial of service attack. We have patched the issue in GitHub commit 8741e57d163a079db05a7107a7609af70931def4. The fix will be included in TensorFlow 2.10.0. We will also cherrypick this commit on TensorFlow 2.9.1, TensorFlow 2.8.1, and TensorFlow 2.7.2, as these are also affected and still in supported range. There are no known workarounds for this issue.
AI Analysis
Technical Summary
CVE-2022-35981 is a vulnerability identified in TensorFlow, an open-source machine learning platform widely used for developing and deploying machine learning models. The issue lies specifically in the `FractionalMaxPoolGrad` operation, which is part of TensorFlow's gradient computation for fractional max pooling layers. The vulnerability is classified as CWE-617 (Reachable Assertion), meaning that the code contains an assertion that can be triggered by crafted inputs, leading to a program crash. In this case, `FractionalMaxPoolGrad` validates its inputs using `CHECK` statements, which cause the program to abort if the inputs are incorrectly sized, rather than returning a controlled error. This behavior can be exploited to cause a denial of service (DoS) by crashing the TensorFlow process when it receives malformed inputs. The affected versions include TensorFlow versions prior to 2.7.2, versions 2.8.0 up to but not including 2.8.1, and versions 2.9.0 up to but not including 2.9.1. The vulnerability was patched in commit 8741e57d163a079db05a7107a7609af70931def4 and included in TensorFlow 2.10.0, with backports to 2.9.1, 2.8.1, and 2.7.2. There are no known workarounds, and no exploits have been reported in the wild. The vulnerability requires that an attacker can supply inputs to the vulnerable function, which typically implies some level of access to the machine learning pipeline or service using TensorFlow. The impact is primarily denial of service due to process termination caused by assertion failure, rather than remote code execution or data breach.
Potential Impact
For European organizations, the impact of CVE-2022-35981 is primarily related to availability disruption of machine learning services that utilize affected TensorFlow versions. Organizations relying on TensorFlow for critical AI workloads, such as financial institutions using ML for fraud detection, healthcare providers using AI for diagnostics, or manufacturing companies employing predictive maintenance, could experience service interruptions if an attacker supplies malformed inputs triggering the assertion failure. While the vulnerability does not lead to data compromise or privilege escalation, denial of service can degrade operational capabilities and potentially cause cascading effects in automated systems. Given the increasing adoption of AI and ML in European industries and public sector services, unpatched systems could face reliability issues. The lack of known exploits reduces immediate risk, but the ease of triggering assertion failures with malformed inputs means that insider threats or attackers with access to ML pipelines could exploit this vulnerability. Additionally, cloud-based ML services hosted in Europe that allow user-supplied models or data could be susceptible to remote DoS attacks. The impact on confidentiality and integrity is minimal, but availability impact could be significant in high-dependence environments.
Mitigation Recommendations
European organizations should prioritize upgrading TensorFlow installations to versions 2.7.2, 2.8.1, 2.9.1, or later, where the vulnerability has been patched. Since no workarounds exist, patching is the primary mitigation. Organizations should audit their ML pipelines to identify any exposed TensorFlow services that accept external inputs, especially those that process untrusted or user-supplied data. Implement input validation and sanitization at the application layer before data reaches TensorFlow to reduce the risk of malformed inputs triggering the assertion. Employ runtime monitoring and alerting for TensorFlow process crashes to detect potential exploitation attempts early. For cloud deployments, restrict access to ML model training and inference endpoints using network segmentation, authentication, and authorization controls to limit exposure. Additionally, consider containerizing TensorFlow workloads with resource limits and automatic restart policies to mitigate the impact of process crashes. Finally, maintain an inventory of TensorFlow versions in use across the organization to ensure timely patch management and compliance.
Affected Countries
Germany, France, United Kingdom, Netherlands, Sweden, Finland, Italy, Spain, Belgium, Poland
CVE-2022-35981: CWE-617: Reachable Assertion in tensorflow tensorflow
Description
TensorFlow is an open source platform for machine learning. `FractionalMaxPoolGrad` validates its inputs with `CHECK` failures instead of with returning errors. If it gets incorrectly sized inputs, the `CHECK` failure can be used to trigger a denial of service attack. We have patched the issue in GitHub commit 8741e57d163a079db05a7107a7609af70931def4. The fix will be included in TensorFlow 2.10.0. We will also cherrypick this commit on TensorFlow 2.9.1, TensorFlow 2.8.1, and TensorFlow 2.7.2, as these are also affected and still in supported range. There are no known workarounds for this issue.
AI-Powered Analysis
Technical Analysis
CVE-2022-35981 is a vulnerability identified in TensorFlow, an open-source machine learning platform widely used for developing and deploying machine learning models. The issue lies specifically in the `FractionalMaxPoolGrad` operation, which is part of TensorFlow's gradient computation for fractional max pooling layers. The vulnerability is classified as CWE-617 (Reachable Assertion), meaning that the code contains an assertion that can be triggered by crafted inputs, leading to a program crash. In this case, `FractionalMaxPoolGrad` validates its inputs using `CHECK` statements, which cause the program to abort if the inputs are incorrectly sized, rather than returning a controlled error. This behavior can be exploited to cause a denial of service (DoS) by crashing the TensorFlow process when it receives malformed inputs. The affected versions include TensorFlow versions prior to 2.7.2, versions 2.8.0 up to but not including 2.8.1, and versions 2.9.0 up to but not including 2.9.1. The vulnerability was patched in commit 8741e57d163a079db05a7107a7609af70931def4 and included in TensorFlow 2.10.0, with backports to 2.9.1, 2.8.1, and 2.7.2. There are no known workarounds, and no exploits have been reported in the wild. The vulnerability requires that an attacker can supply inputs to the vulnerable function, which typically implies some level of access to the machine learning pipeline or service using TensorFlow. The impact is primarily denial of service due to process termination caused by assertion failure, rather than remote code execution or data breach.
Potential Impact
For European organizations, the impact of CVE-2022-35981 is primarily related to availability disruption of machine learning services that utilize affected TensorFlow versions. Organizations relying on TensorFlow for critical AI workloads, such as financial institutions using ML for fraud detection, healthcare providers using AI for diagnostics, or manufacturing companies employing predictive maintenance, could experience service interruptions if an attacker supplies malformed inputs triggering the assertion failure. While the vulnerability does not lead to data compromise or privilege escalation, denial of service can degrade operational capabilities and potentially cause cascading effects in automated systems. Given the increasing adoption of AI and ML in European industries and public sector services, unpatched systems could face reliability issues. The lack of known exploits reduces immediate risk, but the ease of triggering assertion failures with malformed inputs means that insider threats or attackers with access to ML pipelines could exploit this vulnerability. Additionally, cloud-based ML services hosted in Europe that allow user-supplied models or data could be susceptible to remote DoS attacks. The impact on confidentiality and integrity is minimal, but availability impact could be significant in high-dependence environments.
Mitigation Recommendations
European organizations should prioritize upgrading TensorFlow installations to versions 2.7.2, 2.8.1, 2.9.1, or later, where the vulnerability has been patched. Since no workarounds exist, patching is the primary mitigation. Organizations should audit their ML pipelines to identify any exposed TensorFlow services that accept external inputs, especially those that process untrusted or user-supplied data. Implement input validation and sanitization at the application layer before data reaches TensorFlow to reduce the risk of malformed inputs triggering the assertion. Employ runtime monitoring and alerting for TensorFlow process crashes to detect potential exploitation attempts early. For cloud deployments, restrict access to ML model training and inference endpoints using network segmentation, authentication, and authorization controls to limit exposure. Additionally, consider containerizing TensorFlow workloads with resource limits and automatic restart policies to mitigate the impact of process crashes. Finally, maintain an inventory of TensorFlow versions in use across the organization to ensure timely patch management and compliance.
For access to advanced analysis and higher rate limits, contact root@offseq.com
Technical Details
- Data Version
- 5.1
- Assigner Short Name
- GitHub_M
- Date Reserved
- 2022-07-15T00:00:00.000Z
- Cisa Enriched
- true
Threat ID: 682d9845c4522896dcbf40c0
Added to database: 5/21/2025, 9:09:25 AM
Last enriched: 6/22/2025, 7:51:10 PM
Last updated: 8/16/2025, 2:58:10 PM
Views: 13
Related Threats
CVE-2025-53948: CWE-415 Double Free in Santesoft Sante PACS Server
HighCVE-2025-52584: CWE-122 Heap-based Buffer Overflow in Ashlar-Vellum Cobalt
HighCVE-2025-46269: CWE-122 Heap-based Buffer Overflow in Ashlar-Vellum Cobalt
HighCVE-2025-54862: CWE-79 Improper Neutralization of Input During Web Page Generation (XSS or 'Cross-site Scripting') in Santesoft Sante PACS Server
MediumCVE-2025-54759: CWE-79 Improper Neutralization of Input During Web Page Generation (XSS or 'Cross-site Scripting') in Santesoft Sante PACS Server
MediumActions
Updates to AI analysis are available only with a Pro account. Contact root@offseq.com for access.
External Links
Need enhanced features?
Contact root@offseq.com for Pro access with improved analysis and higher rate limits.