Skip to main content

CVE-2022-35998: CWE-617: Reachable Assertion in tensorflow tensorflow

Medium
Published: Fri Sep 16 2022 (09/16/2022, 22:15:23 UTC)
Source: CVE
Vendor/Project: tensorflow
Product: tensorflow

Description

TensorFlow is an open source platform for machine learning. If `EmptyTensorList` receives an input `element_shape` with more than one dimension, it gives a `CHECK` fail that can be used to trigger a denial of service attack. We have patched the issue in GitHub commit c8ba76d48567aed347508e0552a257641931024d. The fix will be included in TensorFlow 2.10.0. We will also cherrypick this commit on TensorFlow 2.9.1, TensorFlow 2.8.1, and TensorFlow 2.7.2, as these are also affected and still in supported range. There are no known workarounds for this issue.

AI-Powered Analysis

AILast updated: 06/22/2025, 17:35:27 UTC

Technical Analysis

CVE-2022-35998 is a medium-severity vulnerability affecting TensorFlow, an open-source machine learning platform widely used for developing and deploying machine learning models. The vulnerability arises from a reachable assertion failure (CWE-617) in the TensorFlow component `EmptyTensorList`. Specifically, if the `EmptyTensorList` operation receives an input parameter `element_shape` with more than one dimension, it triggers a `CHECK` failure, which is an internal assertion that causes the program to terminate unexpectedly. This behavior can be exploited by an attacker to cause a denial of service (DoS) condition by crashing the TensorFlow process. The issue affects multiple TensorFlow versions: all versions prior to 2.7.2, versions from 2.8.0 up to but not including 2.8.1, and versions from 2.9.0 up to but not including 2.9.1. The vulnerability was patched in GitHub commit c8ba76d48567aed347508e0552a257641931024d and the fix is included starting from TensorFlow 2.10.0, with backported patches for 2.7.2, 2.8.1, and 2.9.1. There are no known workarounds, and no exploits have been observed in the wild to date. The vulnerability requires that an attacker can supply crafted input to the `EmptyTensorList` operation, which may be feasible in environments where TensorFlow processes untrusted or user-controlled data. The impact is limited to denial of service through process termination, with no indication of code execution or data corruption. No authentication or user interaction is explicitly required beyond the ability to influence the input to the vulnerable operation.

Potential Impact

For European organizations leveraging TensorFlow in production or research environments, this vulnerability primarily poses a risk of denial of service. This could disrupt machine learning workflows, automated data processing pipelines, or AI-driven services, potentially causing downtime or degraded service availability. Organizations in sectors such as finance, healthcare, automotive, and telecommunications that rely on TensorFlow for critical AI applications may experience operational interruptions. While the vulnerability does not directly compromise confidentiality or integrity, the availability impact could indirectly affect business continuity and service reliability. Given the absence of known exploits, the immediate risk is moderate; however, the widespread use of TensorFlow in European research institutions and enterprises means that unpatched systems could be targeted in the future. The lack of workarounds necessitates timely patching to mitigate the risk. Additionally, environments exposing TensorFlow services to untrusted inputs, such as cloud-based AI platforms or public APIs, are at higher risk of exploitation.

Mitigation Recommendations

European organizations should prioritize upgrading TensorFlow to version 2.10.0 or later, or apply the backported patches available for versions 2.7.2, 2.8.1, and 2.9.1. Since no workarounds exist, patching is the primary mitigation strategy. Organizations should audit their environments to identify all TensorFlow instances, including embedded and containerized deployments, to ensure comprehensive patch coverage. Implement input validation and sanitization controls where TensorFlow processes external or untrusted data to reduce the risk of triggering the assertion failure. Monitoring and alerting on TensorFlow process crashes can help detect exploitation attempts. For cloud or multi-tenant environments, consider isolating TensorFlow workloads and restricting access to trusted users and systems to minimize exposure. Additionally, review and update incident response plans to include procedures for handling TensorFlow-related service disruptions. Finally, maintain awareness of any emerging exploit reports or additional patches from the TensorFlow community.

Need more detailed analysis?Get Pro

Technical Details

Data Version
5.1
Assigner Short Name
GitHub_M
Date Reserved
2022-07-15T00:00:00.000Z
Cisa Enriched
true

Threat ID: 682d9845c4522896dcbf432b

Added to database: 5/21/2025, 9:09:25 AM

Last enriched: 6/22/2025, 5:35:27 PM

Last updated: 8/11/2025, 4:12:30 PM

Views: 11

Actions

PRO

Updates to AI analysis are available only with a Pro account. Contact root@offseq.com for access.

Please log in to the Console to use AI analysis features.

Need enhanced features?

Contact root@offseq.com for Pro access with improved analysis and higher rate limits.

Latest Threats