CVE-2022-36011: CWE-476: NULL Pointer Dereference in tensorflow tensorflow
TensorFlow is an open source platform for machine learning. When `mlir::tfg::ConvertGenericFunctionToFunctionDef` is given empty function attributes, it gives a null dereference. We have patched the issue in GitHub commit 1cf45b831eeb0cab8655c9c7c5d06ec6f45fc41b. The fix will be included in TensorFlow 2.10.0. We will also cherrypick this commit on TensorFlow 2.9.1, TensorFlow 2.8.1, and TensorFlow 2.7.2, as these are also affected and still in supported range. There are no known workarounds for this issue.
AI Analysis
Technical Summary
CVE-2022-36011 is a medium-severity vulnerability in TensorFlow, an open-source machine learning platform widely used for developing and deploying machine learning models. The issue arises in the function `mlir::tfg::ConvertGenericFunctionToFunctionDef` when it receives empty function attributes, leading to a NULL pointer dereference (CWE-476). This type of vulnerability typically causes the affected application to crash or behave unpredictably due to attempts to access memory through a null pointer. The flaw affects multiple TensorFlow versions: all versions prior to 2.7.2, versions from 2.8.0 up to but not including 2.8.1, and versions from 2.9.0 up to but not including 2.9.1. The vulnerability was patched in GitHub commit 1cf45b831eeb0cab8655c9c7c5d06ec6f45fc41b and incorporated into TensorFlow 2.10.0, with backports planned for 2.7.2, 2.8.1, and 2.9.1. There are no known workarounds, and no exploits have been observed in the wild to date. The vulnerability does not require authentication or user interaction to trigger, but exploitation requires the attacker to supply crafted inputs to the vulnerable function, which is typically part of the TensorFlow internal MLIR (Multi-Level Intermediate Representation) infrastructure. The impact primarily affects the availability of the TensorFlow service or application, as the NULL pointer dereference leads to crashes or denial of service. Confidentiality and integrity impacts are minimal or nonexistent based on current information. This vulnerability is relevant for organizations using affected TensorFlow versions in their machine learning pipelines, especially those exposing TensorFlow services or APIs to untrusted inputs or users.
Potential Impact
For European organizations, the impact of CVE-2022-36011 centers on potential denial of service conditions in machine learning workflows that utilize vulnerable TensorFlow versions. Organizations relying on TensorFlow for critical AI/ML applications—such as financial institutions using ML for fraud detection, healthcare providers employing AI diagnostics, or manufacturing firms leveraging predictive maintenance—may experience service interruptions or degraded performance if the vulnerability is triggered. Although no known exploits exist, the lack of workarounds means that unpatched systems remain susceptible to crashes when processing malformed inputs. This could disrupt automated decision-making processes, delay data analysis, or cause downtime in AI-powered services. While the vulnerability does not directly compromise data confidentiality or integrity, availability impacts could indirectly affect business operations and service reliability. Given the increasing adoption of TensorFlow across sectors in Europe, the vulnerability poses a moderate operational risk, particularly for organizations with exposed ML model serving endpoints or those integrating TensorFlow into larger software stacks without strict input validation.
Mitigation Recommendations
To mitigate CVE-2022-36011, European organizations should prioritize upgrading TensorFlow to version 2.10.0 or later, or apply the backported patches available in versions 2.7.2, 2.8.1, and 2.9.1. Since no workarounds exist, patching is the primary defense. Additionally, organizations should implement strict input validation and sanitization on any data or function attributes passed to TensorFlow components, especially if these inputs originate from untrusted or external sources. Employing runtime monitoring and anomaly detection to identify unexpected crashes or abnormal TensorFlow behavior can help detect exploitation attempts early. For environments where immediate patching is not feasible, isolating TensorFlow workloads in sandboxed or containerized environments can limit the impact of crashes on broader systems. Finally, organizations should review their ML deployment architectures to minimize exposure of TensorFlow services to untrusted networks and consider implementing rate limiting or access controls to reduce the risk of malicious input injection.
Affected Countries
Germany, France, United Kingdom, Netherlands, Sweden, Finland, Italy, Spain
CVE-2022-36011: CWE-476: NULL Pointer Dereference in tensorflow tensorflow
Description
TensorFlow is an open source platform for machine learning. When `mlir::tfg::ConvertGenericFunctionToFunctionDef` is given empty function attributes, it gives a null dereference. We have patched the issue in GitHub commit 1cf45b831eeb0cab8655c9c7c5d06ec6f45fc41b. The fix will be included in TensorFlow 2.10.0. We will also cherrypick this commit on TensorFlow 2.9.1, TensorFlow 2.8.1, and TensorFlow 2.7.2, as these are also affected and still in supported range. There are no known workarounds for this issue.
AI-Powered Analysis
Technical Analysis
CVE-2022-36011 is a medium-severity vulnerability in TensorFlow, an open-source machine learning platform widely used for developing and deploying machine learning models. The issue arises in the function `mlir::tfg::ConvertGenericFunctionToFunctionDef` when it receives empty function attributes, leading to a NULL pointer dereference (CWE-476). This type of vulnerability typically causes the affected application to crash or behave unpredictably due to attempts to access memory through a null pointer. The flaw affects multiple TensorFlow versions: all versions prior to 2.7.2, versions from 2.8.0 up to but not including 2.8.1, and versions from 2.9.0 up to but not including 2.9.1. The vulnerability was patched in GitHub commit 1cf45b831eeb0cab8655c9c7c5d06ec6f45fc41b and incorporated into TensorFlow 2.10.0, with backports planned for 2.7.2, 2.8.1, and 2.9.1. There are no known workarounds, and no exploits have been observed in the wild to date. The vulnerability does not require authentication or user interaction to trigger, but exploitation requires the attacker to supply crafted inputs to the vulnerable function, which is typically part of the TensorFlow internal MLIR (Multi-Level Intermediate Representation) infrastructure. The impact primarily affects the availability of the TensorFlow service or application, as the NULL pointer dereference leads to crashes or denial of service. Confidentiality and integrity impacts are minimal or nonexistent based on current information. This vulnerability is relevant for organizations using affected TensorFlow versions in their machine learning pipelines, especially those exposing TensorFlow services or APIs to untrusted inputs or users.
Potential Impact
For European organizations, the impact of CVE-2022-36011 centers on potential denial of service conditions in machine learning workflows that utilize vulnerable TensorFlow versions. Organizations relying on TensorFlow for critical AI/ML applications—such as financial institutions using ML for fraud detection, healthcare providers employing AI diagnostics, or manufacturing firms leveraging predictive maintenance—may experience service interruptions or degraded performance if the vulnerability is triggered. Although no known exploits exist, the lack of workarounds means that unpatched systems remain susceptible to crashes when processing malformed inputs. This could disrupt automated decision-making processes, delay data analysis, or cause downtime in AI-powered services. While the vulnerability does not directly compromise data confidentiality or integrity, availability impacts could indirectly affect business operations and service reliability. Given the increasing adoption of TensorFlow across sectors in Europe, the vulnerability poses a moderate operational risk, particularly for organizations with exposed ML model serving endpoints or those integrating TensorFlow into larger software stacks without strict input validation.
Mitigation Recommendations
To mitigate CVE-2022-36011, European organizations should prioritize upgrading TensorFlow to version 2.10.0 or later, or apply the backported patches available in versions 2.7.2, 2.8.1, and 2.9.1. Since no workarounds exist, patching is the primary defense. Additionally, organizations should implement strict input validation and sanitization on any data or function attributes passed to TensorFlow components, especially if these inputs originate from untrusted or external sources. Employing runtime monitoring and anomaly detection to identify unexpected crashes or abnormal TensorFlow behavior can help detect exploitation attempts early. For environments where immediate patching is not feasible, isolating TensorFlow workloads in sandboxed or containerized environments can limit the impact of crashes on broader systems. Finally, organizations should review their ML deployment architectures to minimize exposure of TensorFlow services to untrusted networks and consider implementing rate limiting or access controls to reduce the risk of malicious input injection.
Affected Countries
For access to advanced analysis and higher rate limits, contact root@offseq.com
Technical Details
- Data Version
- 5.1
- Assigner Short Name
- GitHub_M
- Date Reserved
- 2022-07-15T00:00:00.000Z
- Cisa Enriched
- true
Threat ID: 682d9845c4522896dcbf434b
Added to database: 5/21/2025, 9:09:25 AM
Last enriched: 6/22/2025, 5:23:07 PM
Last updated: 7/26/2025, 12:51:13 AM
Views: 8
Related Threats
CVE-2025-8840: Improper Authorization in jshERP
MediumCVE-2025-8853: CWE-290 Authentication Bypass by Spoofing in 2100 Technology Official Document Management System
CriticalCVE-2025-8838: Improper Authentication in WinterChenS my-site
MediumCVE-2025-8837: Use After Free in JasPer
MediumCVE-2025-8661: Vulnerability in Broadcom Symantec PGP Encryption
MediumActions
Updates to AI analysis are available only with a Pro account. Contact root@offseq.com for access.
External Links
Need enhanced features?
Contact root@offseq.com for Pro access with improved analysis and higher rate limits.