CVE-2022-35995: CWE-617: Reachable Assertion in tensorflow tensorflow
TensorFlow is an open source platform for machine learning. When `AudioSummaryV2` receives an input `sample_rate` with more than one element, it gives a `CHECK` fails that can be used to trigger a denial of service attack. We have patched the issue in GitHub commit bf6b45244992e2ee543c258e519489659c99fb7f. The fix will be included in TensorFlow 2.10.0. We will also cherrypick this commit on TensorFlow 2.9.1, TensorFlow 2.8.1, and TensorFlow 2.7.2, as these are also affected and still in supported range. There are no known workarounds for this issue.
AI Analysis
Technical Summary
CVE-2022-35995 is a medium-severity vulnerability identified in TensorFlow, an open-source machine learning platform widely used for developing and deploying machine learning models. The vulnerability arises from a reachable assertion failure (CWE-617) within the AudioSummaryV2 component of TensorFlow. Specifically, when the AudioSummaryV2 function receives an input parameter 'sample_rate' containing more than one element, it triggers a CHECK failure, which is an assertion designed to validate input assumptions during runtime. This assertion failure causes the TensorFlow process to terminate unexpectedly, leading to a denial of service (DoS) condition. The vulnerability affects multiple TensorFlow versions: all versions prior to 2.7.2, versions from 2.8.0 up to but not including 2.8.1, and versions from 2.9.0 up to but not including 2.9.1. The issue has been addressed in GitHub commit bf6b45244992e2ee543c258e519489659c99fb7f and will be included in TensorFlow 2.10.0, with backported fixes planned for 2.7.2, 2.8.1, and 2.9.1. There are currently no known workarounds for this vulnerability, and no exploits have been observed in the wild to date. The vulnerability requires an attacker to supply a malformed input to the AudioSummaryV2 function, which may be possible in environments where untrusted data is processed by TensorFlow models or services. However, no authentication or user interaction is explicitly required to trigger the assertion failure once the vulnerable function is invoked with crafted input.
Potential Impact
For European organizations leveraging TensorFlow in their machine learning pipelines, especially those processing audio data or utilizing the AudioSummaryV2 functionality, this vulnerability can lead to denial of service conditions. This can disrupt critical AI-driven services, including voice recognition, audio analysis, and other machine learning applications, potentially causing downtime or degraded service availability. In sectors such as finance, healthcare, telecommunications, and automotive industries—where AI and machine learning are increasingly integrated—such disruptions could impact operational continuity and service reliability. Although the vulnerability does not directly compromise confidentiality or integrity, the availability impact could indirectly affect business processes and user trust. Since TensorFlow is widely used in research institutions and enterprises across Europe, unpatched systems remain susceptible to crashes triggered by malformed inputs, which could be exploited in targeted attacks or accidental failures. The absence of known exploits reduces immediate risk, but the vulnerability's presence in supported TensorFlow versions means that organizations must act promptly to mitigate potential exposure.
Mitigation Recommendations
European organizations should prioritize upgrading TensorFlow installations to versions 2.7.2, 2.8.1, 2.9.1, or later, where the vulnerability has been patched. Since no workarounds exist, patching is the primary mitigation strategy. Additionally, organizations should implement strict input validation and sanitization on all data fed into TensorFlow models, particularly for audio-related inputs, to prevent malformed 'sample_rate' parameters from reaching the vulnerable function. Deploying runtime monitoring and anomaly detection to identify unexpected crashes or assertion failures in TensorFlow services can help detect exploitation attempts early. For environments where immediate patching is not feasible, isolating TensorFlow workloads processing untrusted audio data within sandboxed containers or restricted execution environments can limit the impact of potential crashes. Finally, organizations should review their machine learning deployment pipelines to ensure that only trusted or validated data sources are used, reducing the attack surface for triggering this vulnerability.
Affected Countries
Germany, France, United Kingdom, Netherlands, Sweden, Finland, Italy, Spain, Belgium, Poland
CVE-2022-35995: CWE-617: Reachable Assertion in tensorflow tensorflow
Description
TensorFlow is an open source platform for machine learning. When `AudioSummaryV2` receives an input `sample_rate` with more than one element, it gives a `CHECK` fails that can be used to trigger a denial of service attack. We have patched the issue in GitHub commit bf6b45244992e2ee543c258e519489659c99fb7f. The fix will be included in TensorFlow 2.10.0. We will also cherrypick this commit on TensorFlow 2.9.1, TensorFlow 2.8.1, and TensorFlow 2.7.2, as these are also affected and still in supported range. There are no known workarounds for this issue.
AI-Powered Analysis
Technical Analysis
CVE-2022-35995 is a medium-severity vulnerability identified in TensorFlow, an open-source machine learning platform widely used for developing and deploying machine learning models. The vulnerability arises from a reachable assertion failure (CWE-617) within the AudioSummaryV2 component of TensorFlow. Specifically, when the AudioSummaryV2 function receives an input parameter 'sample_rate' containing more than one element, it triggers a CHECK failure, which is an assertion designed to validate input assumptions during runtime. This assertion failure causes the TensorFlow process to terminate unexpectedly, leading to a denial of service (DoS) condition. The vulnerability affects multiple TensorFlow versions: all versions prior to 2.7.2, versions from 2.8.0 up to but not including 2.8.1, and versions from 2.9.0 up to but not including 2.9.1. The issue has been addressed in GitHub commit bf6b45244992e2ee543c258e519489659c99fb7f and will be included in TensorFlow 2.10.0, with backported fixes planned for 2.7.2, 2.8.1, and 2.9.1. There are currently no known workarounds for this vulnerability, and no exploits have been observed in the wild to date. The vulnerability requires an attacker to supply a malformed input to the AudioSummaryV2 function, which may be possible in environments where untrusted data is processed by TensorFlow models or services. However, no authentication or user interaction is explicitly required to trigger the assertion failure once the vulnerable function is invoked with crafted input.
Potential Impact
For European organizations leveraging TensorFlow in their machine learning pipelines, especially those processing audio data or utilizing the AudioSummaryV2 functionality, this vulnerability can lead to denial of service conditions. This can disrupt critical AI-driven services, including voice recognition, audio analysis, and other machine learning applications, potentially causing downtime or degraded service availability. In sectors such as finance, healthcare, telecommunications, and automotive industries—where AI and machine learning are increasingly integrated—such disruptions could impact operational continuity and service reliability. Although the vulnerability does not directly compromise confidentiality or integrity, the availability impact could indirectly affect business processes and user trust. Since TensorFlow is widely used in research institutions and enterprises across Europe, unpatched systems remain susceptible to crashes triggered by malformed inputs, which could be exploited in targeted attacks or accidental failures. The absence of known exploits reduces immediate risk, but the vulnerability's presence in supported TensorFlow versions means that organizations must act promptly to mitigate potential exposure.
Mitigation Recommendations
European organizations should prioritize upgrading TensorFlow installations to versions 2.7.2, 2.8.1, 2.9.1, or later, where the vulnerability has been patched. Since no workarounds exist, patching is the primary mitigation strategy. Additionally, organizations should implement strict input validation and sanitization on all data fed into TensorFlow models, particularly for audio-related inputs, to prevent malformed 'sample_rate' parameters from reaching the vulnerable function. Deploying runtime monitoring and anomaly detection to identify unexpected crashes or assertion failures in TensorFlow services can help detect exploitation attempts early. For environments where immediate patching is not feasible, isolating TensorFlow workloads processing untrusted audio data within sandboxed containers or restricted execution environments can limit the impact of potential crashes. Finally, organizations should review their machine learning deployment pipelines to ensure that only trusted or validated data sources are used, reducing the attack surface for triggering this vulnerability.
For access to advanced analysis and higher rate limits, contact root@offseq.com
Technical Details
- Data Version
- 5.1
- Assigner Short Name
- GitHub_M
- Date Reserved
- 2022-07-15T00:00:00.000Z
- Cisa Enriched
- true
Threat ID: 682d9845c4522896dcbf42ec
Added to database: 5/21/2025, 9:09:25 AM
Last enriched: 6/22/2025, 6:20:10 PM
Last updated: 8/12/2025, 2:26:56 PM
Views: 16
Related Threats
CVE-2025-53948: CWE-415 Double Free in Santesoft Sante PACS Server
HighCVE-2025-52584: CWE-122 Heap-based Buffer Overflow in Ashlar-Vellum Cobalt
HighCVE-2025-46269: CWE-122 Heap-based Buffer Overflow in Ashlar-Vellum Cobalt
HighCVE-2025-54862: CWE-79 Improper Neutralization of Input During Web Page Generation (XSS or 'Cross-site Scripting') in Santesoft Sante PACS Server
MediumCVE-2025-54759: CWE-79 Improper Neutralization of Input During Web Page Generation (XSS or 'Cross-site Scripting') in Santesoft Sante PACS Server
MediumActions
Updates to AI analysis are available only with a Pro account. Contact root@offseq.com for access.
External Links
Need enhanced features?
Contact root@offseq.com for Pro access with improved analysis and higher rate limits.