Skip to main content

CVE-2022-36015: CWE-190: Integer Overflow or Wraparound in tensorflow tensorflow

Medium
Published: Fri Sep 16 2022 (09/16/2022, 22:55:21 UTC)
Source: CVE
Vendor/Project: tensorflow
Product: tensorflow

Description

TensorFlow is an open source platform for machine learning. When `RangeSize` receives values that do not fit into an `int64_t`, it crashes. We have patched the issue in GitHub commit 37e64539cd29fcfb814c4451152a60f5d107b0f0. The fix will be included in TensorFlow 2.10.0. We will also cherrypick this commit on TensorFlow 2.9.1, TensorFlow 2.8.1, and TensorFlow 2.7.2, as these are also affected and still in supported range. There are no known workarounds for this issue.

AI-Powered Analysis

AILast updated: 06/22/2025, 17:22:03 UTC

Technical Analysis

CVE-2022-36015 is a medium-severity vulnerability affecting TensorFlow, an open-source machine learning platform widely used for developing and deploying machine learning models. The vulnerability arises from an integer overflow or wraparound condition (CWE-190) in the `RangeSize` function. Specifically, when `RangeSize` receives input values that exceed the storage capacity of a signed 64-bit integer (`int64_t`), it causes the application to crash. This crash is due to improper handling of integer overflow, which can lead to unexpected behavior in the TensorFlow runtime. The issue affects multiple TensorFlow versions: all versions prior to 2.7.2, versions between 2.8.0 and 2.8.1, and versions between 2.9.0 and 2.9.1. The vulnerability has been patched in TensorFlow 2.10.0 and backported to supported versions 2.7.2, 2.8.1, and 2.9.1. No known workarounds exist, and no exploits have been reported in the wild to date. The vulnerability does not require authentication or user interaction to trigger, but it requires crafted input data that causes the integer overflow in the `RangeSize` function. The impact is primarily a denial-of-service (DoS) condition through application crashes, which could disrupt machine learning workflows or services relying on TensorFlow. Since TensorFlow is often embedded within larger applications or services, this vulnerability could cause unexpected service interruptions or failures in AI-driven systems.

Potential Impact

For European organizations, the impact of CVE-2022-36015 depends on the extent to which TensorFlow is integrated into their machine learning pipelines, AI services, or embedded systems. Organizations in sectors such as finance, healthcare, automotive, and manufacturing that leverage TensorFlow for predictive analytics, autonomous systems, or medical diagnostics could experience service disruptions if exploited. The denial-of-service caused by the integer overflow could interrupt critical AI-driven processes, leading to operational downtime, loss of productivity, and potential financial losses. Additionally, organizations providing AI-as-a-service or cloud-based machine learning platforms may face reputational damage and customer trust issues if their services become unstable. Although no direct data breach or code execution is indicated, the availability impact alone can be significant, especially for real-time or safety-critical applications. The lack of known exploits reduces immediate risk, but the widespread use of TensorFlow in European tech ecosystems means that unpatched systems remain vulnerable to potential future attacks or accidental crashes triggered by malformed inputs.

Mitigation Recommendations

European organizations should prioritize updating TensorFlow to version 2.10.0 or later, or apply the backported patches available for versions 2.7.2, 2.8.1, and 2.9.1. Given the absence of workarounds, patching is the primary mitigation strategy. Organizations should conduct an inventory of all TensorFlow deployments, including embedded systems and containerized environments, to identify affected versions. For environments where immediate patching is not feasible, implementing input validation and sanitization to ensure that values passed to `RangeSize` do not exceed `int64_t` limits can reduce the risk of triggering the overflow. Monitoring application logs and TensorFlow error reports for crashes related to `RangeSize` can help detect exploitation attempts or accidental triggers. Additionally, organizations should review their machine learning pipelines to isolate TensorFlow processes and implement failover mechanisms to maintain service availability in case of crashes. Security teams should also stay updated on TensorFlow security advisories and subscribe to relevant threat intelligence feeds to respond promptly to any emerging exploits.

Need more detailed analysis?Get Pro

Technical Details

Data Version
5.1
Assigner Short Name
GitHub_M
Date Reserved
2022-07-15T00:00:00.000Z
Cisa Enriched
true

Threat ID: 682d9845c4522896dcbf4381

Added to database: 5/21/2025, 9:09:25 AM

Last enriched: 6/22/2025, 5:22:03 PM

Last updated: 7/31/2025, 7:31:18 PM

Views: 13

Actions

PRO

Updates to AI analysis are available only with a Pro account. Contact root@offseq.com for access.

Please log in to the Console to use AI analysis features.

Need enhanced features?

Contact root@offseq.com for Pro access with improved analysis and higher rate limits.

Latest Threats