Skip to main content

CVE-2022-36000: CWE-476: NULL Pointer Dereference in tensorflow tensorflow

Medium
Published: Fri Sep 16 2022 (09/16/2022, 22:30:25 UTC)
Source: CVE
Vendor/Project: tensorflow
Product: tensorflow

Description

TensorFlow is an open source platform for machine learning. When `mlir::tfg::ConvertGenericFunctionToFunctionDef` is given empty function attributes, it gives a null dereference. We have patched the issue in GitHub commit aed36912609fc07229b4d0a7b44f3f48efc00fd0. The fix will be included in TensorFlow 2.10.0. We will also cherrypick this commit on TensorFlow 2.9.1, TensorFlow 2.8.1, and TensorFlow 2.7.2, as these are also affected and still in supported range. There are no known workarounds for this issue.

AI-Powered Analysis

AILast updated: 06/22/2025, 17:34:56 UTC

Technical Analysis

CVE-2022-36000 is a medium-severity vulnerability affecting multiple versions of TensorFlow, an open-source machine learning platform widely used in both research and production environments. The issue arises from a NULL pointer dereference in the function mlir::tfg::ConvertGenericFunctionToFunctionDef when it processes empty function attributes. Specifically, if this function receives an empty set of attributes, it attempts to dereference a NULL pointer, leading to a crash or denial of service. This vulnerability affects TensorFlow versions prior to 2.7.2, as well as certain patch-level releases in the 2.8.x and 2.9.x branches (>=2.8.0, <2.8.1 and >=2.9.0, <2.9.1). The problem has been addressed in TensorFlow 2.10.0 and backported to supported versions 2.7.2, 2.8.1, and 2.9.1. There are currently no known workarounds for this issue, and no exploits have been reported in the wild. The vulnerability is classified under CWE-476 (NULL Pointer Dereference), which typically results in application crashes and potential denial of service but does not directly enable code execution or privilege escalation. The root cause is a lack of proper validation or handling of empty function attributes within the TensorFlow MLIR (Multi-Level Intermediate Representation) transformation pipeline, which is a critical component in TensorFlow's graph optimization and function conversion processes. Exploiting this vulnerability requires crafting specific inputs or models that trigger the empty attribute condition during function conversion, which may be feasible in environments where untrusted or malformed models are processed.

Potential Impact

For European organizations, the impact of CVE-2022-36000 primarily revolves around service availability and reliability of machine learning workloads that utilize affected TensorFlow versions. Organizations relying on TensorFlow for critical AI/ML applications—such as financial institutions using ML for fraud detection, healthcare providers employing AI for diagnostics, or manufacturing firms leveraging predictive maintenance—may experience application crashes or denial of service if exposed to malformed inputs triggering this vulnerability. While the vulnerability does not appear to allow arbitrary code execution or data leakage, the disruption of ML pipelines could lead to operational delays, loss of productivity, and potential financial impact. Additionally, organizations that accept third-party or user-submitted ML models without strict validation could be at higher risk, as attackers might craft malicious models to intentionally cause crashes. Given the widespread adoption of TensorFlow in research institutions and enterprises across Europe, the vulnerability could affect a broad range of sectors. However, the absence of known exploits and the requirement to process specific malformed inputs somewhat limits the immediate risk. Still, the vulnerability underscores the importance of maintaining up-to-date ML frameworks to ensure stability and security of AI-driven services.

Mitigation Recommendations

To mitigate CVE-2022-36000, European organizations should prioritize upgrading TensorFlow installations to versions 2.7.2, 2.8.1, 2.9.1, or later, where the patch has been applied. Given the lack of workarounds, patching is the primary defense. Organizations should implement strict input validation and sanitization for any ML models or function definitions processed by TensorFlow, especially if models originate from untrusted sources. Deploying runtime monitoring to detect abnormal crashes or service interruptions in ML pipelines can help identify exploitation attempts. Additionally, sandboxing TensorFlow workloads or isolating ML processing environments can limit the impact of potential denial-of-service conditions. For organizations using containerized or orchestrated ML deployments, updating container images and CI/CD pipelines to incorporate patched TensorFlow versions is critical. Finally, maintaining an inventory of TensorFlow versions in use across the organization will aid in targeted remediation efforts.

Need more detailed analysis?Get Pro

Technical Details

Data Version
5.1
Assigner Short Name
GitHub_M
Date Reserved
2022-07-15T00:00:00.000Z
Cisa Enriched
true

Threat ID: 682d9845c4522896dcbf4333

Added to database: 5/21/2025, 9:09:25 AM

Last enriched: 6/22/2025, 5:34:56 PM

Last updated: 8/13/2025, 8:59:24 AM

Views: 14

Actions

PRO

Updates to AI analysis are available only with a Pro account. Contact root@offseq.com for access.

Please log in to the Console to use AI analysis features.

Need enhanced features?

Contact root@offseq.com for Pro access with improved analysis and higher rate limits.

Latest Threats