CVE-2022-35998: CWE-617: Reachable Assertion in tensorflow tensorflow
TensorFlow is an open source platform for machine learning. If `EmptyTensorList` receives an input `element_shape` with more than one dimension, it gives a `CHECK` fail that can be used to trigger a denial of service attack. We have patched the issue in GitHub commit c8ba76d48567aed347508e0552a257641931024d. The fix will be included in TensorFlow 2.10.0. We will also cherrypick this commit on TensorFlow 2.9.1, TensorFlow 2.8.1, and TensorFlow 2.7.2, as these are also affected and still in supported range. There are no known workarounds for this issue.
AI Analysis
Technical Summary
CVE-2022-35998 is a medium-severity vulnerability affecting TensorFlow, an open-source machine learning platform widely used for developing and deploying machine learning models. The vulnerability arises from a reachable assertion failure (CWE-617) in the TensorFlow component `EmptyTensorList`. Specifically, if the `EmptyTensorList` operation receives an input parameter `element_shape` with more than one dimension, it triggers a `CHECK` failure, which is an internal assertion that causes the program to terminate unexpectedly. This behavior can be exploited by an attacker to cause a denial of service (DoS) condition by crashing the TensorFlow process. The issue affects multiple TensorFlow versions: all versions prior to 2.7.2, versions from 2.8.0 up to but not including 2.8.1, and versions from 2.9.0 up to but not including 2.9.1. The vulnerability was patched in GitHub commit c8ba76d48567aed347508e0552a257641931024d and the fix is included starting from TensorFlow 2.10.0, with backported patches for 2.7.2, 2.8.1, and 2.9.1. There are no known workarounds, and no exploits have been observed in the wild to date. The vulnerability requires that an attacker can supply crafted input to the `EmptyTensorList` operation, which may be feasible in environments where TensorFlow processes untrusted or user-controlled data. The impact is limited to denial of service through process termination, with no indication of code execution or data corruption. No authentication or user interaction is explicitly required beyond the ability to influence the input to the vulnerable operation.
Potential Impact
For European organizations leveraging TensorFlow in production or research environments, this vulnerability primarily poses a risk of denial of service. This could disrupt machine learning workflows, automated data processing pipelines, or AI-driven services, potentially causing downtime or degraded service availability. Organizations in sectors such as finance, healthcare, automotive, and telecommunications that rely on TensorFlow for critical AI applications may experience operational interruptions. While the vulnerability does not directly compromise confidentiality or integrity, the availability impact could indirectly affect business continuity and service reliability. Given the absence of known exploits, the immediate risk is moderate; however, the widespread use of TensorFlow in European research institutions and enterprises means that unpatched systems could be targeted in the future. The lack of workarounds necessitates timely patching to mitigate the risk. Additionally, environments exposing TensorFlow services to untrusted inputs, such as cloud-based AI platforms or public APIs, are at higher risk of exploitation.
Mitigation Recommendations
European organizations should prioritize upgrading TensorFlow to version 2.10.0 or later, or apply the backported patches available for versions 2.7.2, 2.8.1, and 2.9.1. Since no workarounds exist, patching is the primary mitigation strategy. Organizations should audit their environments to identify all TensorFlow instances, including embedded and containerized deployments, to ensure comprehensive patch coverage. Implement input validation and sanitization controls where TensorFlow processes external or untrusted data to reduce the risk of triggering the assertion failure. Monitoring and alerting on TensorFlow process crashes can help detect exploitation attempts. For cloud or multi-tenant environments, consider isolating TensorFlow workloads and restricting access to trusted users and systems to minimize exposure. Additionally, review and update incident response plans to include procedures for handling TensorFlow-related service disruptions. Finally, maintain awareness of any emerging exploit reports or additional patches from the TensorFlow community.
Affected Countries
Germany, France, United Kingdom, Netherlands, Sweden, Finland, Italy, Spain
CVE-2022-35998: CWE-617: Reachable Assertion in tensorflow tensorflow
Description
TensorFlow is an open source platform for machine learning. If `EmptyTensorList` receives an input `element_shape` with more than one dimension, it gives a `CHECK` fail that can be used to trigger a denial of service attack. We have patched the issue in GitHub commit c8ba76d48567aed347508e0552a257641931024d. The fix will be included in TensorFlow 2.10.0. We will also cherrypick this commit on TensorFlow 2.9.1, TensorFlow 2.8.1, and TensorFlow 2.7.2, as these are also affected and still in supported range. There are no known workarounds for this issue.
AI-Powered Analysis
Technical Analysis
CVE-2022-35998 is a medium-severity vulnerability affecting TensorFlow, an open-source machine learning platform widely used for developing and deploying machine learning models. The vulnerability arises from a reachable assertion failure (CWE-617) in the TensorFlow component `EmptyTensorList`. Specifically, if the `EmptyTensorList` operation receives an input parameter `element_shape` with more than one dimension, it triggers a `CHECK` failure, which is an internal assertion that causes the program to terminate unexpectedly. This behavior can be exploited by an attacker to cause a denial of service (DoS) condition by crashing the TensorFlow process. The issue affects multiple TensorFlow versions: all versions prior to 2.7.2, versions from 2.8.0 up to but not including 2.8.1, and versions from 2.9.0 up to but not including 2.9.1. The vulnerability was patched in GitHub commit c8ba76d48567aed347508e0552a257641931024d and the fix is included starting from TensorFlow 2.10.0, with backported patches for 2.7.2, 2.8.1, and 2.9.1. There are no known workarounds, and no exploits have been observed in the wild to date. The vulnerability requires that an attacker can supply crafted input to the `EmptyTensorList` operation, which may be feasible in environments where TensorFlow processes untrusted or user-controlled data. The impact is limited to denial of service through process termination, with no indication of code execution or data corruption. No authentication or user interaction is explicitly required beyond the ability to influence the input to the vulnerable operation.
Potential Impact
For European organizations leveraging TensorFlow in production or research environments, this vulnerability primarily poses a risk of denial of service. This could disrupt machine learning workflows, automated data processing pipelines, or AI-driven services, potentially causing downtime or degraded service availability. Organizations in sectors such as finance, healthcare, automotive, and telecommunications that rely on TensorFlow for critical AI applications may experience operational interruptions. While the vulnerability does not directly compromise confidentiality or integrity, the availability impact could indirectly affect business continuity and service reliability. Given the absence of known exploits, the immediate risk is moderate; however, the widespread use of TensorFlow in European research institutions and enterprises means that unpatched systems could be targeted in the future. The lack of workarounds necessitates timely patching to mitigate the risk. Additionally, environments exposing TensorFlow services to untrusted inputs, such as cloud-based AI platforms or public APIs, are at higher risk of exploitation.
Mitigation Recommendations
European organizations should prioritize upgrading TensorFlow to version 2.10.0 or later, or apply the backported patches available for versions 2.7.2, 2.8.1, and 2.9.1. Since no workarounds exist, patching is the primary mitigation strategy. Organizations should audit their environments to identify all TensorFlow instances, including embedded and containerized deployments, to ensure comprehensive patch coverage. Implement input validation and sanitization controls where TensorFlow processes external or untrusted data to reduce the risk of triggering the assertion failure. Monitoring and alerting on TensorFlow process crashes can help detect exploitation attempts. For cloud or multi-tenant environments, consider isolating TensorFlow workloads and restricting access to trusted users and systems to minimize exposure. Additionally, review and update incident response plans to include procedures for handling TensorFlow-related service disruptions. Finally, maintain awareness of any emerging exploit reports or additional patches from the TensorFlow community.
Affected Countries
For access to advanced analysis and higher rate limits, contact root@offseq.com
Technical Details
- Data Version
- 5.1
- Assigner Short Name
- GitHub_M
- Date Reserved
- 2022-07-15T00:00:00.000Z
- Cisa Enriched
- true
Threat ID: 682d9845c4522896dcbf432b
Added to database: 5/21/2025, 9:09:25 AM
Last enriched: 6/22/2025, 5:35:27 PM
Last updated: 8/11/2025, 4:12:30 PM
Views: 11
Related Threats
CVE-2025-53948: CWE-415 Double Free in Santesoft Sante PACS Server
HighCVE-2025-52584: CWE-122 Heap-based Buffer Overflow in Ashlar-Vellum Cobalt
HighCVE-2025-46269: CWE-122 Heap-based Buffer Overflow in Ashlar-Vellum Cobalt
HighCVE-2025-54862: CWE-79 Improper Neutralization of Input During Web Page Generation (XSS or 'Cross-site Scripting') in Santesoft Sante PACS Server
MediumCVE-2025-54759: CWE-79 Improper Neutralization of Input During Web Page Generation (XSS or 'Cross-site Scripting') in Santesoft Sante PACS Server
MediumActions
Updates to AI analysis are available only with a Pro account. Contact root@offseq.com for access.
External Links
Need enhanced features?
Contact root@offseq.com for Pro access with improved analysis and higher rate limits.