CVE-2022-36012: CWE-617: Reachable Assertion in tensorflow tensorflow
TensorFlow is an open source platform for machine learning. When `mlir::tfg::ConvertGenericFunctionToFunctionDef` is given empty function attributes, it crashes. We have patched the issue in GitHub commit ad069af92392efee1418c48ff561fd3070a03d7b. The fix will be included in TensorFlow 2.10.0. We will also cherrypick this commit on TensorFlow 2.9.1, TensorFlow 2.8.1, and TensorFlow 2.7.2, as these are also affected and still in supported range. There are no known workarounds for this issue.
AI Analysis
Technical Summary
CVE-2022-36012 is a medium-severity vulnerability affecting TensorFlow, an open-source machine learning platform widely used for developing and deploying machine learning models. The vulnerability arises in the function `mlir::tfg::ConvertGenericFunctionToFunctionDef` when it is provided with empty function attributes. Under these conditions, the function triggers a reachable assertion failure, causing the TensorFlow process to crash. This type of vulnerability is categorized under CWE-617 (Reachable Assertion), which means that an assertion statement can be triggered by crafted input, leading to a denial-of-service (DoS) condition. The affected TensorFlow versions include all releases prior to 2.7.2, versions between 2.8.0 and 2.8.1, and versions between 2.9.0 and 2.9.1. The issue has been patched in TensorFlow 2.10.0 and backported to supported versions 2.7.2, 2.8.1, and 2.9.1. There are currently no known workarounds or exploits in the wild. The vulnerability requires that the attacker can supply or influence the input to the vulnerable function, which is typically part of the internal MLIR (Multi-Level Intermediate Representation) transformation pipeline within TensorFlow. Exploitation does not appear to require authentication but does require the ability to submit crafted inputs to the TensorFlow environment. The impact is primarily a denial-of-service via process crash rather than code execution or data compromise. This vulnerability is relevant for organizations using TensorFlow in production environments, especially those exposing TensorFlow services or APIs to untrusted inputs or users.
Potential Impact
For European organizations, the primary impact of CVE-2022-36012 is the potential for denial-of-service conditions in machine learning applications relying on vulnerable TensorFlow versions. This can disrupt critical AI-driven services such as predictive analytics, automated decision-making, and real-time data processing. Industries heavily dependent on machine learning, including finance, healthcare, automotive, and telecommunications, could experience service outages or degraded performance. While the vulnerability does not directly lead to data breaches or code execution, repeated crashes could cause operational instability and loss of availability, impacting business continuity. Additionally, organizations using TensorFlow in cloud environments or exposed APIs may face increased risk if attackers can supply malicious inputs remotely. The lack of known exploits reduces immediate risk, but the widespread use of TensorFlow in European research institutions and enterprises means that unpatched systems remain vulnerable to potential future exploitation. The vulnerability also raises concerns for compliance with European regulations on service availability and operational resilience, such as the NIS Directive and GDPR requirements related to system reliability.
Mitigation Recommendations
European organizations should prioritize upgrading TensorFlow to version 2.10.0 or later, or apply the backported patches available for versions 2.7.2, 2.8.1, and 2.9.1. Since no workarounds exist, patching is the most effective mitigation. Additionally, organizations should audit their machine learning pipelines to identify any components that accept or process user-supplied function attributes or inputs that could trigger this vulnerability. Implement input validation and sanitization controls to prevent empty or malformed function attributes from reaching the vulnerable code path. For TensorFlow deployments exposed to external users or integrated into multi-tenant environments, consider implementing network segmentation and strict access controls to limit exposure. Monitoring TensorFlow logs and application behavior for unexpected crashes or assertion failures can help detect exploitation attempts. Finally, organizations should incorporate this vulnerability into their incident response and vulnerability management processes, ensuring timely patch deployment and continuous security assessment of machine learning infrastructure.
Affected Countries
Germany, France, United Kingdom, Netherlands, Sweden, Finland, Italy, Spain, Belgium, Poland
CVE-2022-36012: CWE-617: Reachable Assertion in tensorflow tensorflow
Description
TensorFlow is an open source platform for machine learning. When `mlir::tfg::ConvertGenericFunctionToFunctionDef` is given empty function attributes, it crashes. We have patched the issue in GitHub commit ad069af92392efee1418c48ff561fd3070a03d7b. The fix will be included in TensorFlow 2.10.0. We will also cherrypick this commit on TensorFlow 2.9.1, TensorFlow 2.8.1, and TensorFlow 2.7.2, as these are also affected and still in supported range. There are no known workarounds for this issue.
AI-Powered Analysis
Technical Analysis
CVE-2022-36012 is a medium-severity vulnerability affecting TensorFlow, an open-source machine learning platform widely used for developing and deploying machine learning models. The vulnerability arises in the function `mlir::tfg::ConvertGenericFunctionToFunctionDef` when it is provided with empty function attributes. Under these conditions, the function triggers a reachable assertion failure, causing the TensorFlow process to crash. This type of vulnerability is categorized under CWE-617 (Reachable Assertion), which means that an assertion statement can be triggered by crafted input, leading to a denial-of-service (DoS) condition. The affected TensorFlow versions include all releases prior to 2.7.2, versions between 2.8.0 and 2.8.1, and versions between 2.9.0 and 2.9.1. The issue has been patched in TensorFlow 2.10.0 and backported to supported versions 2.7.2, 2.8.1, and 2.9.1. There are currently no known workarounds or exploits in the wild. The vulnerability requires that the attacker can supply or influence the input to the vulnerable function, which is typically part of the internal MLIR (Multi-Level Intermediate Representation) transformation pipeline within TensorFlow. Exploitation does not appear to require authentication but does require the ability to submit crafted inputs to the TensorFlow environment. The impact is primarily a denial-of-service via process crash rather than code execution or data compromise. This vulnerability is relevant for organizations using TensorFlow in production environments, especially those exposing TensorFlow services or APIs to untrusted inputs or users.
Potential Impact
For European organizations, the primary impact of CVE-2022-36012 is the potential for denial-of-service conditions in machine learning applications relying on vulnerable TensorFlow versions. This can disrupt critical AI-driven services such as predictive analytics, automated decision-making, and real-time data processing. Industries heavily dependent on machine learning, including finance, healthcare, automotive, and telecommunications, could experience service outages or degraded performance. While the vulnerability does not directly lead to data breaches or code execution, repeated crashes could cause operational instability and loss of availability, impacting business continuity. Additionally, organizations using TensorFlow in cloud environments or exposed APIs may face increased risk if attackers can supply malicious inputs remotely. The lack of known exploits reduces immediate risk, but the widespread use of TensorFlow in European research institutions and enterprises means that unpatched systems remain vulnerable to potential future exploitation. The vulnerability also raises concerns for compliance with European regulations on service availability and operational resilience, such as the NIS Directive and GDPR requirements related to system reliability.
Mitigation Recommendations
European organizations should prioritize upgrading TensorFlow to version 2.10.0 or later, or apply the backported patches available for versions 2.7.2, 2.8.1, and 2.9.1. Since no workarounds exist, patching is the most effective mitigation. Additionally, organizations should audit their machine learning pipelines to identify any components that accept or process user-supplied function attributes or inputs that could trigger this vulnerability. Implement input validation and sanitization controls to prevent empty or malformed function attributes from reaching the vulnerable code path. For TensorFlow deployments exposed to external users or integrated into multi-tenant environments, consider implementing network segmentation and strict access controls to limit exposure. Monitoring TensorFlow logs and application behavior for unexpected crashes or assertion failures can help detect exploitation attempts. Finally, organizations should incorporate this vulnerability into their incident response and vulnerability management processes, ensuring timely patch deployment and continuous security assessment of machine learning infrastructure.
For access to advanced analysis and higher rate limits, contact root@offseq.com
Technical Details
- Data Version
- 5.1
- Assigner Short Name
- GitHub_M
- Date Reserved
- 2022-07-15T00:00:00.000Z
- Cisa Enriched
- true
Threat ID: 682d9845c4522896dcbf434f
Added to database: 5/21/2025, 9:09:25 AM
Last enriched: 6/22/2025, 5:22:52 PM
Last updated: 8/15/2025, 11:50:15 AM
Views: 15
Related Threats
CVE-2025-53948: CWE-415 Double Free in Santesoft Sante PACS Server
HighCVE-2025-52584: CWE-122 Heap-based Buffer Overflow in Ashlar-Vellum Cobalt
HighCVE-2025-46269: CWE-122 Heap-based Buffer Overflow in Ashlar-Vellum Cobalt
HighCVE-2025-54862: CWE-79 Improper Neutralization of Input During Web Page Generation (XSS or 'Cross-site Scripting') in Santesoft Sante PACS Server
MediumCVE-2025-54759: CWE-79 Improper Neutralization of Input During Web Page Generation (XSS or 'Cross-site Scripting') in Santesoft Sante PACS Server
MediumActions
Updates to AI analysis are available only with a Pro account. Contact root@offseq.com for access.
External Links
Need enhanced features?
Contact root@offseq.com for Pro access with improved analysis and higher rate limits.