CVE-2022-36005: CWE-617: Reachable Assertion in tensorflow tensorflow
TensorFlow is an open source platform for machine learning. When `tf.quantization.fake_quant_with_min_max_vars_gradient` receives input `min` or `max` that is nonscalar, it gives a `CHECK` fail that can trigger a denial of service attack. We have patched the issue in GitHub commit f3cf67ac5705f4f04721d15e485e192bb319feed. The fix will be included in TensorFlow 2.10.0. We will also cherrypick this commit on TensorFlow 2.9.1, TensorFlow 2.8.1, and TensorFlow 2.7.2, as these are also affected and still in supported range. There are no known workarounds for this issue.
AI Analysis
Technical Summary
CVE-2022-36005 is a vulnerability identified in TensorFlow, an open-source machine learning platform widely used for developing and deploying machine learning models. The vulnerability arises in the function `tf.quantization.fake_quant_with_min_max_vars_gradient`, which is part of TensorFlow's quantization utilities used to simulate low-precision arithmetic during training. Specifically, when the inputs `min` or `max` to this function are nonscalar (e.g., tensors or arrays instead of single scalar values), the program triggers a `CHECK` failure, causing an assertion failure. This assertion failure leads to an abrupt termination of the TensorFlow process, effectively resulting in a denial of service (DoS) condition. The root cause is classified under CWE-617 (Reachable Assertion), indicating that an assertion statement can be triggered by crafted input, leading to a program crash. The vulnerability affects multiple TensorFlow versions: all versions prior to 2.7.2, versions from 2.8.0 up to but not including 2.8.1, and versions from 2.9.0 up to but not including 2.9.1. The issue was patched in a GitHub commit (f3cf67ac5705f4f04721d15e485e192bb319feed) and the fix is included starting with TensorFlow 2.10.0. Backported patches are also planned for 2.7.2, 2.8.1, and 2.9.1, which are still supported versions. There are no known workarounds for this vulnerability, meaning that users must apply the patch or upgrade to a fixed version to mitigate the risk. Exploitation of this vulnerability requires feeding malformed inputs to the vulnerable function, which typically would require some level of access to the machine learning model training or inference pipeline that uses TensorFlow. There are no known exploits in the wild at this time, indicating that active exploitation has not been observed. However, the vulnerability could be leveraged by an attacker to disrupt machine learning workflows by causing crashes, potentially impacting availability of services relying on TensorFlow models.
Potential Impact
For European organizations, the impact of CVE-2022-36005 primarily concerns the availability of machine learning services and workflows that depend on vulnerable TensorFlow versions. Organizations using TensorFlow for critical applications—such as financial modeling, healthcare diagnostics, industrial automation, or public sector AI services—may experience service interruptions if an attacker supplies crafted inputs that trigger the assertion failure. This could lead to denial of service conditions, disrupting business operations or automated decision-making processes. While the vulnerability does not directly compromise confidentiality or integrity, the loss of availability can have cascading effects, especially in environments where machine learning models are integral to real-time or safety-critical systems. Additionally, organizations that expose TensorFlow-based APIs or services to external users or partners may be at higher risk if attackers can influence input data. The lack of known exploits reduces immediate risk, but the ease of triggering the assertion failure with malformed inputs means that unpatched systems remain vulnerable to potential DoS attacks. Given the widespread adoption of TensorFlow across industries in Europe, the vulnerability could affect a broad range of sectors, including technology companies, research institutions, and enterprises leveraging AI. The impact is more pronounced in environments where TensorFlow is deployed in production or cloud-based services without strict input validation or sandboxing.
Mitigation Recommendations
1. Upgrade TensorFlow to version 2.10.0 or later, or apply the backported patches available for versions 2.7.2, 2.8.1, and 2.9.1 as soon as possible. 2. Implement strict input validation and sanitization on all data fed into TensorFlow quantization functions, especially ensuring that `min` and `max` parameters are scalar values as expected. 3. Employ runtime monitoring and anomaly detection to identify unexpected crashes or assertion failures in TensorFlow processes, enabling rapid incident response. 4. Isolate TensorFlow workloads in containerized or sandboxed environments to limit the impact of potential crashes on broader systems. 5. For organizations exposing machine learning inference APIs, enforce strict access controls and input validation at the API gateway to prevent malicious inputs from reaching TensorFlow internals. 6. Conduct regular security audits and update dependency management policies to ensure TensorFlow and other ML libraries remain up to date with security patches. 7. Educate data scientists and ML engineers about secure coding practices related to input handling in TensorFlow to prevent inadvertent triggering of vulnerabilities.
Affected Countries
Germany, France, United Kingdom, Netherlands, Sweden, Finland, Belgium, Italy, Spain
CVE-2022-36005: CWE-617: Reachable Assertion in tensorflow tensorflow
Description
TensorFlow is an open source platform for machine learning. When `tf.quantization.fake_quant_with_min_max_vars_gradient` receives input `min` or `max` that is nonscalar, it gives a `CHECK` fail that can trigger a denial of service attack. We have patched the issue in GitHub commit f3cf67ac5705f4f04721d15e485e192bb319feed. The fix will be included in TensorFlow 2.10.0. We will also cherrypick this commit on TensorFlow 2.9.1, TensorFlow 2.8.1, and TensorFlow 2.7.2, as these are also affected and still in supported range. There are no known workarounds for this issue.
AI-Powered Analysis
Technical Analysis
CVE-2022-36005 is a vulnerability identified in TensorFlow, an open-source machine learning platform widely used for developing and deploying machine learning models. The vulnerability arises in the function `tf.quantization.fake_quant_with_min_max_vars_gradient`, which is part of TensorFlow's quantization utilities used to simulate low-precision arithmetic during training. Specifically, when the inputs `min` or `max` to this function are nonscalar (e.g., tensors or arrays instead of single scalar values), the program triggers a `CHECK` failure, causing an assertion failure. This assertion failure leads to an abrupt termination of the TensorFlow process, effectively resulting in a denial of service (DoS) condition. The root cause is classified under CWE-617 (Reachable Assertion), indicating that an assertion statement can be triggered by crafted input, leading to a program crash. The vulnerability affects multiple TensorFlow versions: all versions prior to 2.7.2, versions from 2.8.0 up to but not including 2.8.1, and versions from 2.9.0 up to but not including 2.9.1. The issue was patched in a GitHub commit (f3cf67ac5705f4f04721d15e485e192bb319feed) and the fix is included starting with TensorFlow 2.10.0. Backported patches are also planned for 2.7.2, 2.8.1, and 2.9.1, which are still supported versions. There are no known workarounds for this vulnerability, meaning that users must apply the patch or upgrade to a fixed version to mitigate the risk. Exploitation of this vulnerability requires feeding malformed inputs to the vulnerable function, which typically would require some level of access to the machine learning model training or inference pipeline that uses TensorFlow. There are no known exploits in the wild at this time, indicating that active exploitation has not been observed. However, the vulnerability could be leveraged by an attacker to disrupt machine learning workflows by causing crashes, potentially impacting availability of services relying on TensorFlow models.
Potential Impact
For European organizations, the impact of CVE-2022-36005 primarily concerns the availability of machine learning services and workflows that depend on vulnerable TensorFlow versions. Organizations using TensorFlow for critical applications—such as financial modeling, healthcare diagnostics, industrial automation, or public sector AI services—may experience service interruptions if an attacker supplies crafted inputs that trigger the assertion failure. This could lead to denial of service conditions, disrupting business operations or automated decision-making processes. While the vulnerability does not directly compromise confidentiality or integrity, the loss of availability can have cascading effects, especially in environments where machine learning models are integral to real-time or safety-critical systems. Additionally, organizations that expose TensorFlow-based APIs or services to external users or partners may be at higher risk if attackers can influence input data. The lack of known exploits reduces immediate risk, but the ease of triggering the assertion failure with malformed inputs means that unpatched systems remain vulnerable to potential DoS attacks. Given the widespread adoption of TensorFlow across industries in Europe, the vulnerability could affect a broad range of sectors, including technology companies, research institutions, and enterprises leveraging AI. The impact is more pronounced in environments where TensorFlow is deployed in production or cloud-based services without strict input validation or sandboxing.
Mitigation Recommendations
1. Upgrade TensorFlow to version 2.10.0 or later, or apply the backported patches available for versions 2.7.2, 2.8.1, and 2.9.1 as soon as possible. 2. Implement strict input validation and sanitization on all data fed into TensorFlow quantization functions, especially ensuring that `min` and `max` parameters are scalar values as expected. 3. Employ runtime monitoring and anomaly detection to identify unexpected crashes or assertion failures in TensorFlow processes, enabling rapid incident response. 4. Isolate TensorFlow workloads in containerized or sandboxed environments to limit the impact of potential crashes on broader systems. 5. For organizations exposing machine learning inference APIs, enforce strict access controls and input validation at the API gateway to prevent malicious inputs from reaching TensorFlow internals. 6. Conduct regular security audits and update dependency management policies to ensure TensorFlow and other ML libraries remain up to date with security patches. 7. Educate data scientists and ML engineers about secure coding practices related to input handling in TensorFlow to prevent inadvertent triggering of vulnerabilities.
Affected Countries
For access to advanced analysis and higher rate limits, contact root@offseq.com
Technical Details
- Data Version
- 5.1
- Assigner Short Name
- GitHub_M
- Date Reserved
- 2022-07-15T00:00:00.000Z
- Cisa Enriched
- true
Threat ID: 682d9845c4522896dcbf4347
Added to database: 5/21/2025, 9:09:25 AM
Last enriched: 6/22/2025, 5:23:26 PM
Last updated: 8/17/2025, 10:41:58 AM
Views: 16
Related Threats
CVE-2025-53948: CWE-415 Double Free in Santesoft Sante PACS Server
HighCVE-2025-52584: CWE-122 Heap-based Buffer Overflow in Ashlar-Vellum Cobalt
HighCVE-2025-46269: CWE-122 Heap-based Buffer Overflow in Ashlar-Vellum Cobalt
HighCVE-2025-54862: CWE-79 Improper Neutralization of Input During Web Page Generation (XSS or 'Cross-site Scripting') in Santesoft Sante PACS Server
MediumCVE-2025-54759: CWE-79 Improper Neutralization of Input During Web Page Generation (XSS or 'Cross-site Scripting') in Santesoft Sante PACS Server
MediumActions
Updates to AI analysis are available only with a Pro account. Contact root@offseq.com for access.
External Links
Need enhanced features?
Contact root@offseq.com for Pro access with improved analysis and higher rate limits.