Skip to main content

CVE-2022-36012: CWE-617: Reachable Assertion in tensorflow tensorflow

Medium
Published: Fri Sep 16 2022 (09/16/2022, 22:55:15 UTC)
Source: CVE
Vendor/Project: tensorflow
Product: tensorflow

Description

TensorFlow is an open source platform for machine learning. When `mlir::tfg::ConvertGenericFunctionToFunctionDef` is given empty function attributes, it crashes. We have patched the issue in GitHub commit ad069af92392efee1418c48ff561fd3070a03d7b. The fix will be included in TensorFlow 2.10.0. We will also cherrypick this commit on TensorFlow 2.9.1, TensorFlow 2.8.1, and TensorFlow 2.7.2, as these are also affected and still in supported range. There are no known workarounds for this issue.

AI-Powered Analysis

AILast updated: 06/22/2025, 17:22:52 UTC

Technical Analysis

CVE-2022-36012 is a medium-severity vulnerability affecting TensorFlow, an open-source machine learning platform widely used for developing and deploying machine learning models. The vulnerability arises in the function `mlir::tfg::ConvertGenericFunctionToFunctionDef` when it is provided with empty function attributes. Under these conditions, the function triggers a reachable assertion failure, causing the TensorFlow process to crash. This type of vulnerability is categorized under CWE-617 (Reachable Assertion), which means that an assertion statement can be triggered by crafted input, leading to a denial-of-service (DoS) condition. The affected TensorFlow versions include all releases prior to 2.7.2, versions between 2.8.0 and 2.8.1, and versions between 2.9.0 and 2.9.1. The issue has been patched in TensorFlow 2.10.0 and backported to supported versions 2.7.2, 2.8.1, and 2.9.1. There are currently no known workarounds or exploits in the wild. The vulnerability requires that the attacker can supply or influence the input to the vulnerable function, which is typically part of the internal MLIR (Multi-Level Intermediate Representation) transformation pipeline within TensorFlow. Exploitation does not appear to require authentication but does require the ability to submit crafted inputs to the TensorFlow environment. The impact is primarily a denial-of-service via process crash rather than code execution or data compromise. This vulnerability is relevant for organizations using TensorFlow in production environments, especially those exposing TensorFlow services or APIs to untrusted inputs or users.

Potential Impact

For European organizations, the primary impact of CVE-2022-36012 is the potential for denial-of-service conditions in machine learning applications relying on vulnerable TensorFlow versions. This can disrupt critical AI-driven services such as predictive analytics, automated decision-making, and real-time data processing. Industries heavily dependent on machine learning, including finance, healthcare, automotive, and telecommunications, could experience service outages or degraded performance. While the vulnerability does not directly lead to data breaches or code execution, repeated crashes could cause operational instability and loss of availability, impacting business continuity. Additionally, organizations using TensorFlow in cloud environments or exposed APIs may face increased risk if attackers can supply malicious inputs remotely. The lack of known exploits reduces immediate risk, but the widespread use of TensorFlow in European research institutions and enterprises means that unpatched systems remain vulnerable to potential future exploitation. The vulnerability also raises concerns for compliance with European regulations on service availability and operational resilience, such as the NIS Directive and GDPR requirements related to system reliability.

Mitigation Recommendations

European organizations should prioritize upgrading TensorFlow to version 2.10.0 or later, or apply the backported patches available for versions 2.7.2, 2.8.1, and 2.9.1. Since no workarounds exist, patching is the most effective mitigation. Additionally, organizations should audit their machine learning pipelines to identify any components that accept or process user-supplied function attributes or inputs that could trigger this vulnerability. Implement input validation and sanitization controls to prevent empty or malformed function attributes from reaching the vulnerable code path. For TensorFlow deployments exposed to external users or integrated into multi-tenant environments, consider implementing network segmentation and strict access controls to limit exposure. Monitoring TensorFlow logs and application behavior for unexpected crashes or assertion failures can help detect exploitation attempts. Finally, organizations should incorporate this vulnerability into their incident response and vulnerability management processes, ensuring timely patch deployment and continuous security assessment of machine learning infrastructure.

Need more detailed analysis?Get Pro

Technical Details

Data Version
5.1
Assigner Short Name
GitHub_M
Date Reserved
2022-07-15T00:00:00.000Z
Cisa Enriched
true

Threat ID: 682d9845c4522896dcbf434f

Added to database: 5/21/2025, 9:09:25 AM

Last enriched: 6/22/2025, 5:22:52 PM

Last updated: 8/15/2025, 11:50:15 AM

Views: 15

Actions

PRO

Updates to AI analysis are available only with a Pro account. Contact root@offseq.com for access.

Please log in to the Console to use AI analysis features.

Need enhanced features?

Contact root@offseq.com for Pro access with improved analysis and higher rate limits.

Latest Threats