CVE-2022-36015: CWE-190: Integer Overflow or Wraparound in tensorflow tensorflow
TensorFlow is an open source platform for machine learning. When `RangeSize` receives values that do not fit into an `int64_t`, it crashes. We have patched the issue in GitHub commit 37e64539cd29fcfb814c4451152a60f5d107b0f0. The fix will be included in TensorFlow 2.10.0. We will also cherrypick this commit on TensorFlow 2.9.1, TensorFlow 2.8.1, and TensorFlow 2.7.2, as these are also affected and still in supported range. There are no known workarounds for this issue.
AI Analysis
Technical Summary
CVE-2022-36015 is a medium-severity vulnerability affecting TensorFlow, an open-source machine learning platform widely used for developing and deploying machine learning models. The vulnerability arises from an integer overflow or wraparound condition (CWE-190) in the `RangeSize` function. Specifically, when `RangeSize` receives input values that exceed the storage capacity of a signed 64-bit integer (`int64_t`), it causes the application to crash. This crash is due to improper handling of integer overflow, which can lead to unexpected behavior in the TensorFlow runtime. The issue affects multiple TensorFlow versions: all versions prior to 2.7.2, versions between 2.8.0 and 2.8.1, and versions between 2.9.0 and 2.9.1. The vulnerability has been patched in TensorFlow 2.10.0 and backported to supported versions 2.7.2, 2.8.1, and 2.9.1. No known workarounds exist, and no exploits have been reported in the wild to date. The vulnerability does not require authentication or user interaction to trigger, but it requires crafted input data that causes the integer overflow in the `RangeSize` function. The impact is primarily a denial-of-service (DoS) condition through application crashes, which could disrupt machine learning workflows or services relying on TensorFlow. Since TensorFlow is often embedded within larger applications or services, this vulnerability could cause unexpected service interruptions or failures in AI-driven systems.
Potential Impact
For European organizations, the impact of CVE-2022-36015 depends on the extent to which TensorFlow is integrated into their machine learning pipelines, AI services, or embedded systems. Organizations in sectors such as finance, healthcare, automotive, and manufacturing that leverage TensorFlow for predictive analytics, autonomous systems, or medical diagnostics could experience service disruptions if exploited. The denial-of-service caused by the integer overflow could interrupt critical AI-driven processes, leading to operational downtime, loss of productivity, and potential financial losses. Additionally, organizations providing AI-as-a-service or cloud-based machine learning platforms may face reputational damage and customer trust issues if their services become unstable. Although no direct data breach or code execution is indicated, the availability impact alone can be significant, especially for real-time or safety-critical applications. The lack of known exploits reduces immediate risk, but the widespread use of TensorFlow in European tech ecosystems means that unpatched systems remain vulnerable to potential future attacks or accidental crashes triggered by malformed inputs.
Mitigation Recommendations
European organizations should prioritize updating TensorFlow to version 2.10.0 or later, or apply the backported patches available for versions 2.7.2, 2.8.1, and 2.9.1. Given the absence of workarounds, patching is the primary mitigation strategy. Organizations should conduct an inventory of all TensorFlow deployments, including embedded systems and containerized environments, to identify affected versions. For environments where immediate patching is not feasible, implementing input validation and sanitization to ensure that values passed to `RangeSize` do not exceed `int64_t` limits can reduce the risk of triggering the overflow. Monitoring application logs and TensorFlow error reports for crashes related to `RangeSize` can help detect exploitation attempts or accidental triggers. Additionally, organizations should review their machine learning pipelines to isolate TensorFlow processes and implement failover mechanisms to maintain service availability in case of crashes. Security teams should also stay updated on TensorFlow security advisories and subscribe to relevant threat intelligence feeds to respond promptly to any emerging exploits.
Affected Countries
Germany, France, United Kingdom, Netherlands, Sweden, Finland, Italy, Spain
CVE-2022-36015: CWE-190: Integer Overflow or Wraparound in tensorflow tensorflow
Description
TensorFlow is an open source platform for machine learning. When `RangeSize` receives values that do not fit into an `int64_t`, it crashes. We have patched the issue in GitHub commit 37e64539cd29fcfb814c4451152a60f5d107b0f0. The fix will be included in TensorFlow 2.10.0. We will also cherrypick this commit on TensorFlow 2.9.1, TensorFlow 2.8.1, and TensorFlow 2.7.2, as these are also affected and still in supported range. There are no known workarounds for this issue.
AI-Powered Analysis
Technical Analysis
CVE-2022-36015 is a medium-severity vulnerability affecting TensorFlow, an open-source machine learning platform widely used for developing and deploying machine learning models. The vulnerability arises from an integer overflow or wraparound condition (CWE-190) in the `RangeSize` function. Specifically, when `RangeSize` receives input values that exceed the storage capacity of a signed 64-bit integer (`int64_t`), it causes the application to crash. This crash is due to improper handling of integer overflow, which can lead to unexpected behavior in the TensorFlow runtime. The issue affects multiple TensorFlow versions: all versions prior to 2.7.2, versions between 2.8.0 and 2.8.1, and versions between 2.9.0 and 2.9.1. The vulnerability has been patched in TensorFlow 2.10.0 and backported to supported versions 2.7.2, 2.8.1, and 2.9.1. No known workarounds exist, and no exploits have been reported in the wild to date. The vulnerability does not require authentication or user interaction to trigger, but it requires crafted input data that causes the integer overflow in the `RangeSize` function. The impact is primarily a denial-of-service (DoS) condition through application crashes, which could disrupt machine learning workflows or services relying on TensorFlow. Since TensorFlow is often embedded within larger applications or services, this vulnerability could cause unexpected service interruptions or failures in AI-driven systems.
Potential Impact
For European organizations, the impact of CVE-2022-36015 depends on the extent to which TensorFlow is integrated into their machine learning pipelines, AI services, or embedded systems. Organizations in sectors such as finance, healthcare, automotive, and manufacturing that leverage TensorFlow for predictive analytics, autonomous systems, or medical diagnostics could experience service disruptions if exploited. The denial-of-service caused by the integer overflow could interrupt critical AI-driven processes, leading to operational downtime, loss of productivity, and potential financial losses. Additionally, organizations providing AI-as-a-service or cloud-based machine learning platforms may face reputational damage and customer trust issues if their services become unstable. Although no direct data breach or code execution is indicated, the availability impact alone can be significant, especially for real-time or safety-critical applications. The lack of known exploits reduces immediate risk, but the widespread use of TensorFlow in European tech ecosystems means that unpatched systems remain vulnerable to potential future attacks or accidental crashes triggered by malformed inputs.
Mitigation Recommendations
European organizations should prioritize updating TensorFlow to version 2.10.0 or later, or apply the backported patches available for versions 2.7.2, 2.8.1, and 2.9.1. Given the absence of workarounds, patching is the primary mitigation strategy. Organizations should conduct an inventory of all TensorFlow deployments, including embedded systems and containerized environments, to identify affected versions. For environments where immediate patching is not feasible, implementing input validation and sanitization to ensure that values passed to `RangeSize` do not exceed `int64_t` limits can reduce the risk of triggering the overflow. Monitoring application logs and TensorFlow error reports for crashes related to `RangeSize` can help detect exploitation attempts or accidental triggers. Additionally, organizations should review their machine learning pipelines to isolate TensorFlow processes and implement failover mechanisms to maintain service availability in case of crashes. Security teams should also stay updated on TensorFlow security advisories and subscribe to relevant threat intelligence feeds to respond promptly to any emerging exploits.
Affected Countries
For access to advanced analysis and higher rate limits, contact root@offseq.com
Technical Details
- Data Version
- 5.1
- Assigner Short Name
- GitHub_M
- Date Reserved
- 2022-07-15T00:00:00.000Z
- Cisa Enriched
- true
Threat ID: 682d9845c4522896dcbf4381
Added to database: 5/21/2025, 9:09:25 AM
Last enriched: 6/22/2025, 5:22:03 PM
Last updated: 7/31/2025, 7:31:18 PM
Views: 13
Related Threats
CVE-2025-8957: SQL Injection in Campcodes Online Flight Booking Management System
MediumCVE-2025-54707: CWE-89 Improper Neutralization of Special Elements used in an SQL Command ('SQL Injection') in RealMag777 MDTF
CriticalCVE-2025-54706: CWE-79 Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting') in Noor Alam Magical Posts Display
MediumCVE-2025-54705: CWE-862 Missing Authorization in magepeopleteam WpEvently
MediumCVE-2025-54704: CWE-79 Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting') in hashthemes Easy Elementor Addons
MediumActions
Updates to AI analysis are available only with a Pro account. Contact root@offseq.com for access.
External Links
Need enhanced features?
Contact root@offseq.com for Pro access with improved analysis and higher rate limits.