Skip to main content

CVE-2022-36014: CWE-476: NULL Pointer Dereference in tensorflow tensorflow

Medium
Published: Fri Sep 16 2022 (09/16/2022, 22:35:11 UTC)
Source: CVE
Vendor/Project: tensorflow
Product: tensorflow

Description

TensorFlow is an open source platform for machine learning. When `mlir::tfg::TFOp::nameAttr` receives null type list attributes, it crashes. We have patched the issue in GitHub commits 3a754740d5414e362512ee981eefba41561a63a6 and a0f0b9a21c9270930457095092f558fbad4c03e5. The fix will be included in TensorFlow 2.10.0. We will also cherrypick this commit on TensorFlow 2.9.1, TensorFlow 2.8.1, and TensorFlow 2.7.2, as these are also affected and still in supported range. There are no known workarounds for this issue.

AI-Powered Analysis

AILast updated: 06/22/2025, 17:22:17 UTC

Technical Analysis

CVE-2022-36014 is a medium-severity vulnerability identified in TensorFlow, an open-source machine learning platform widely used for developing and deploying machine learning models. The vulnerability is classified as CWE-476, a NULL Pointer Dereference, which occurs when the function `mlir::tfg::TFOp::nameAttr` receives null type list attributes. This improper handling causes the TensorFlow process to crash, leading to a denial of service (DoS) condition. The issue affects multiple TensorFlow versions: all versions prior to 2.7.2, versions from 2.8.0 up to but not including 2.8.1, and versions from 2.9.0 up to but not including 2.9.1. The vulnerability has been patched in subsequent releases, specifically in TensorFlow 2.10.0 and backported fixes for 2.9.1, 2.8.1, and 2.7.2. There are no known workarounds for this issue, and no exploits have been reported in the wild to date. The vulnerability does not require authentication or user interaction to be triggered, as it is caused by malformed input leading to a crash. The impact is primarily on availability, as the NULL pointer dereference causes the TensorFlow service or application to terminate unexpectedly. Confidentiality and integrity impacts are not directly indicated by this vulnerability. The affected component is part of the MLIR (Multi-Level Intermediate Representation) framework within TensorFlow, which is used internally for optimizing and compiling machine learning models. Given TensorFlow's widespread use in research, industry, and cloud services, this vulnerability could disrupt machine learning workflows and services relying on affected versions if exploited.

Potential Impact

For European organizations, the primary impact of CVE-2022-36014 is the potential disruption of machine learning services and workflows that depend on vulnerable TensorFlow versions. This could affect sectors such as finance, healthcare, automotive, and telecommunications, where machine learning models are integral to operations, analytics, and decision-making. A denial of service caused by the crash could lead to downtime, loss of productivity, and delays in critical data processing or model training. Organizations relying on automated ML pipelines or real-time inference services may experience interruptions, potentially impacting service-level agreements and operational efficiency. Although no data breach or integrity compromise is directly linked to this vulnerability, the unavailability of ML services could indirectly affect business continuity and customer trust. Additionally, organizations using TensorFlow in cloud environments or as part of AI platforms may face cascading effects if the underlying ML infrastructure becomes unstable. Since no known exploits exist in the wild, the immediate risk is moderate; however, the absence of workarounds and the ease of triggering the crash by malformed input means that attackers could develop exploits to cause denial of service, especially in exposed or multi-tenant environments.

Mitigation Recommendations

European organizations should prioritize upgrading TensorFlow installations to patched versions: 2.7.2 or later, 2.8.1 or later, 2.9.1 or later, or ideally 2.10.0 where the fix is included. Given the lack of workarounds, patching is the most effective mitigation. Organizations should audit their ML environments to identify TensorFlow versions in use, including dependencies in container images, cloud ML services, and embedded systems. Implement input validation and sanitization where possible to prevent malformed attributes from reaching the vulnerable function, although this may be challenging given the internal nature of the vulnerability. Monitoring and logging TensorFlow application crashes can help detect exploitation attempts. For cloud deployments, consider isolating ML workloads and restricting access to trusted users and services to reduce exposure. Incorporate vulnerability management processes that include TensorFlow and related ML frameworks to ensure timely patching. Finally, test patched versions in staging environments to ensure compatibility and stability before production deployment, as ML workloads can be sensitive to framework changes.

Need more detailed analysis?Get Pro

Technical Details

Data Version
5.1
Assigner Short Name
GitHub_M
Date Reserved
2022-07-15T00:00:00.000Z
Cisa Enriched
true

Threat ID: 682d9845c4522896dcbf4372

Added to database: 5/21/2025, 9:09:25 AM

Last enriched: 6/22/2025, 5:22:17 PM

Last updated: 8/12/2025, 2:07:48 AM

Views: 14

Actions

PRO

Updates to AI analysis are available only with a Pro account. Contact root@offseq.com for access.

Please log in to the Console to use AI analysis features.

Need enhanced features?

Contact root@offseq.com for Pro access with improved analysis and higher rate limits.

Latest Threats