Skip to main content

CVE-2022-36011: CWE-476: NULL Pointer Dereference in tensorflow tensorflow

Medium
Published: Fri Sep 16 2022 (09/16/2022, 22:30:21 UTC)
Source: CVE
Vendor/Project: tensorflow
Product: tensorflow

Description

TensorFlow is an open source platform for machine learning. When `mlir::tfg::ConvertGenericFunctionToFunctionDef` is given empty function attributes, it gives a null dereference. We have patched the issue in GitHub commit 1cf45b831eeb0cab8655c9c7c5d06ec6f45fc41b. The fix will be included in TensorFlow 2.10.0. We will also cherrypick this commit on TensorFlow 2.9.1, TensorFlow 2.8.1, and TensorFlow 2.7.2, as these are also affected and still in supported range. There are no known workarounds for this issue.

AI-Powered Analysis

AILast updated: 06/22/2025, 17:23:07 UTC

Technical Analysis

CVE-2022-36011 is a medium-severity vulnerability in TensorFlow, an open-source machine learning platform widely used for developing and deploying machine learning models. The issue arises in the function `mlir::tfg::ConvertGenericFunctionToFunctionDef` when it receives empty function attributes, leading to a NULL pointer dereference (CWE-476). This type of vulnerability typically causes the affected application to crash or behave unpredictably due to attempts to access memory through a null pointer. The flaw affects multiple TensorFlow versions: all versions prior to 2.7.2, versions from 2.8.0 up to but not including 2.8.1, and versions from 2.9.0 up to but not including 2.9.1. The vulnerability was patched in GitHub commit 1cf45b831eeb0cab8655c9c7c5d06ec6f45fc41b and incorporated into TensorFlow 2.10.0, with backports planned for 2.7.2, 2.8.1, and 2.9.1. There are no known workarounds, and no exploits have been observed in the wild to date. The vulnerability does not require authentication or user interaction to trigger, but exploitation requires the attacker to supply crafted inputs to the vulnerable function, which is typically part of the TensorFlow internal MLIR (Multi-Level Intermediate Representation) infrastructure. The impact primarily affects the availability of the TensorFlow service or application, as the NULL pointer dereference leads to crashes or denial of service. Confidentiality and integrity impacts are minimal or nonexistent based on current information. This vulnerability is relevant for organizations using affected TensorFlow versions in their machine learning pipelines, especially those exposing TensorFlow services or APIs to untrusted inputs or users.

Potential Impact

For European organizations, the impact of CVE-2022-36011 centers on potential denial of service conditions in machine learning workflows that utilize vulnerable TensorFlow versions. Organizations relying on TensorFlow for critical AI/ML applications—such as financial institutions using ML for fraud detection, healthcare providers employing AI diagnostics, or manufacturing firms leveraging predictive maintenance—may experience service interruptions or degraded performance if the vulnerability is triggered. Although no known exploits exist, the lack of workarounds means that unpatched systems remain susceptible to crashes when processing malformed inputs. This could disrupt automated decision-making processes, delay data analysis, or cause downtime in AI-powered services. While the vulnerability does not directly compromise data confidentiality or integrity, availability impacts could indirectly affect business operations and service reliability. Given the increasing adoption of TensorFlow across sectors in Europe, the vulnerability poses a moderate operational risk, particularly for organizations with exposed ML model serving endpoints or those integrating TensorFlow into larger software stacks without strict input validation.

Mitigation Recommendations

To mitigate CVE-2022-36011, European organizations should prioritize upgrading TensorFlow to version 2.10.0 or later, or apply the backported patches available in versions 2.7.2, 2.8.1, and 2.9.1. Since no workarounds exist, patching is the primary defense. Additionally, organizations should implement strict input validation and sanitization on any data or function attributes passed to TensorFlow components, especially if these inputs originate from untrusted or external sources. Employing runtime monitoring and anomaly detection to identify unexpected crashes or abnormal TensorFlow behavior can help detect exploitation attempts early. For environments where immediate patching is not feasible, isolating TensorFlow workloads in sandboxed or containerized environments can limit the impact of crashes on broader systems. Finally, organizations should review their ML deployment architectures to minimize exposure of TensorFlow services to untrusted networks and consider implementing rate limiting or access controls to reduce the risk of malicious input injection.

Need more detailed analysis?Get Pro

Technical Details

Data Version
5.1
Assigner Short Name
GitHub_M
Date Reserved
2022-07-15T00:00:00.000Z
Cisa Enriched
true

Threat ID: 682d9845c4522896dcbf434b

Added to database: 5/21/2025, 9:09:25 AM

Last enriched: 6/22/2025, 5:23:07 PM

Last updated: 7/26/2025, 12:51:13 AM

Views: 8

Actions

PRO

Updates to AI analysis are available only with a Pro account. Contact root@offseq.com for access.

Please log in to the Console to use AI analysis features.

Need enhanced features?

Contact root@offseq.com for Pro access with improved analysis and higher rate limits.

Latest Threats