Skip to main content
Press slash or control plus K to focus the search. Use the arrow keys to navigate results and press enter to open a threat.
Reconnecting to live updates…

CVE-2022-36011: CWE-476: NULL Pointer Dereference in tensorflow tensorflow

0
Medium
Published: Fri Sep 16 2022 (09/16/2022, 22:30:21 UTC)
Source: CVE
Vendor/Project: tensorflow
Product: tensorflow

Description

TensorFlow is an open source platform for machine learning. When `mlir::tfg::ConvertGenericFunctionToFunctionDef` is given empty function attributes, it gives a null dereference. We have patched the issue in GitHub commit 1cf45b831eeb0cab8655c9c7c5d06ec6f45fc41b. The fix will be included in TensorFlow 2.10.0. We will also cherrypick this commit on TensorFlow 2.9.1, TensorFlow 2.8.1, and TensorFlow 2.7.2, as these are also affected and still in supported range. There are no known workarounds for this issue.

AI-Powered Analysis

AILast updated: 06/22/2025, 17:23:07 UTC

Technical Analysis

CVE-2022-36011 is a medium-severity vulnerability in TensorFlow, an open-source machine learning platform widely used for developing and deploying machine learning models. The issue arises in the function `mlir::tfg::ConvertGenericFunctionToFunctionDef` when it receives empty function attributes, leading to a NULL pointer dereference (CWE-476). This type of vulnerability typically causes the affected application to crash or behave unpredictably due to attempts to access memory through a null pointer. The flaw affects multiple TensorFlow versions: all versions prior to 2.7.2, versions from 2.8.0 up to but not including 2.8.1, and versions from 2.9.0 up to but not including 2.9.1. The vulnerability was patched in GitHub commit 1cf45b831eeb0cab8655c9c7c5d06ec6f45fc41b and incorporated into TensorFlow 2.10.0, with backports planned for 2.7.2, 2.8.1, and 2.9.1. There are no known workarounds, and no exploits have been observed in the wild to date. The vulnerability does not require authentication or user interaction to trigger, but exploitation requires the attacker to supply crafted inputs to the vulnerable function, which is typically part of the TensorFlow internal MLIR (Multi-Level Intermediate Representation) infrastructure. The impact primarily affects the availability of the TensorFlow service or application, as the NULL pointer dereference leads to crashes or denial of service. Confidentiality and integrity impacts are minimal or nonexistent based on current information. This vulnerability is relevant for organizations using affected TensorFlow versions in their machine learning pipelines, especially those exposing TensorFlow services or APIs to untrusted inputs or users.

Potential Impact

For European organizations, the impact of CVE-2022-36011 centers on potential denial of service conditions in machine learning workflows that utilize vulnerable TensorFlow versions. Organizations relying on TensorFlow for critical AI/ML applications—such as financial institutions using ML for fraud detection, healthcare providers employing AI diagnostics, or manufacturing firms leveraging predictive maintenance—may experience service interruptions or degraded performance if the vulnerability is triggered. Although no known exploits exist, the lack of workarounds means that unpatched systems remain susceptible to crashes when processing malformed inputs. This could disrupt automated decision-making processes, delay data analysis, or cause downtime in AI-powered services. While the vulnerability does not directly compromise data confidentiality or integrity, availability impacts could indirectly affect business operations and service reliability. Given the increasing adoption of TensorFlow across sectors in Europe, the vulnerability poses a moderate operational risk, particularly for organizations with exposed ML model serving endpoints or those integrating TensorFlow into larger software stacks without strict input validation.

Mitigation Recommendations

To mitigate CVE-2022-36011, European organizations should prioritize upgrading TensorFlow to version 2.10.0 or later, or apply the backported patches available in versions 2.7.2, 2.8.1, and 2.9.1. Since no workarounds exist, patching is the primary defense. Additionally, organizations should implement strict input validation and sanitization on any data or function attributes passed to TensorFlow components, especially if these inputs originate from untrusted or external sources. Employing runtime monitoring and anomaly detection to identify unexpected crashes or abnormal TensorFlow behavior can help detect exploitation attempts early. For environments where immediate patching is not feasible, isolating TensorFlow workloads in sandboxed or containerized environments can limit the impact of crashes on broader systems. Finally, organizations should review their ML deployment architectures to minimize exposure of TensorFlow services to untrusted networks and consider implementing rate limiting or access controls to reduce the risk of malicious input injection.

Need more detailed analysis?Upgrade to Pro Console

Technical Details

Data Version
5.1
Assigner Short Name
GitHub_M
Date Reserved
2022-07-15T00:00:00.000Z
Cisa Enriched
true

Threat ID: 682d9845c4522896dcbf434b

Added to database: 5/21/2025, 9:09:25 AM

Last enriched: 6/22/2025, 5:23:07 PM

Last updated: 2/7/2026, 7:55:00 AM

Views: 43

Community Reviews

0 reviews

Crowdsource mitigation strategies, share intel context, and vote on the most helpful responses. Sign in to add your voice and help keep defenders ahead.

Sort by
Loading community insights…

Want to contribute mitigation steps or threat intel context? Sign in or create an account to join the community discussion.

Actions

PRO

Updates to AI analysis require Pro Console access. Upgrade inside Console → Billing.

Please log in to the Console to use AI analysis features.

Need more coverage?

Upgrade to Pro Console in Console -> Billing for AI refresh and higher limits.

For incident response and remediation, OffSeq services can help resolve threats faster.

Latest Threats