Skip to main content
Press slash or control plus K to focus the search. Use the arrow keys to navigate results and press enter to open a threat.
Reconnecting to live updates…

CVE-2022-36015: CWE-190: Integer Overflow or Wraparound in tensorflow tensorflow

0
Medium
Published: Fri Sep 16 2022 (09/16/2022, 22:55:21 UTC)
Source: CVE
Vendor/Project: tensorflow
Product: tensorflow

Description

TensorFlow is an open source platform for machine learning. When `RangeSize` receives values that do not fit into an `int64_t`, it crashes. We have patched the issue in GitHub commit 37e64539cd29fcfb814c4451152a60f5d107b0f0. The fix will be included in TensorFlow 2.10.0. We will also cherrypick this commit on TensorFlow 2.9.1, TensorFlow 2.8.1, and TensorFlow 2.7.2, as these are also affected and still in supported range. There are no known workarounds for this issue.

AI-Powered Analysis

AILast updated: 06/22/2025, 17:22:03 UTC

Technical Analysis

CVE-2022-36015 is a medium-severity vulnerability affecting TensorFlow, an open-source machine learning platform widely used for developing and deploying machine learning models. The vulnerability arises from an integer overflow or wraparound condition (CWE-190) in the `RangeSize` function. Specifically, when `RangeSize` receives input values that exceed the storage capacity of a signed 64-bit integer (`int64_t`), it causes the application to crash. This crash is due to improper handling of integer overflow, which can lead to unexpected behavior in the TensorFlow runtime. The issue affects multiple TensorFlow versions: all versions prior to 2.7.2, versions between 2.8.0 and 2.8.1, and versions between 2.9.0 and 2.9.1. The vulnerability has been patched in TensorFlow 2.10.0 and backported to supported versions 2.7.2, 2.8.1, and 2.9.1. No known workarounds exist, and no exploits have been reported in the wild to date. The vulnerability does not require authentication or user interaction to trigger, but it requires crafted input data that causes the integer overflow in the `RangeSize` function. The impact is primarily a denial-of-service (DoS) condition through application crashes, which could disrupt machine learning workflows or services relying on TensorFlow. Since TensorFlow is often embedded within larger applications or services, this vulnerability could cause unexpected service interruptions or failures in AI-driven systems.

Potential Impact

For European organizations, the impact of CVE-2022-36015 depends on the extent to which TensorFlow is integrated into their machine learning pipelines, AI services, or embedded systems. Organizations in sectors such as finance, healthcare, automotive, and manufacturing that leverage TensorFlow for predictive analytics, autonomous systems, or medical diagnostics could experience service disruptions if exploited. The denial-of-service caused by the integer overflow could interrupt critical AI-driven processes, leading to operational downtime, loss of productivity, and potential financial losses. Additionally, organizations providing AI-as-a-service or cloud-based machine learning platforms may face reputational damage and customer trust issues if their services become unstable. Although no direct data breach or code execution is indicated, the availability impact alone can be significant, especially for real-time or safety-critical applications. The lack of known exploits reduces immediate risk, but the widespread use of TensorFlow in European tech ecosystems means that unpatched systems remain vulnerable to potential future attacks or accidental crashes triggered by malformed inputs.

Mitigation Recommendations

European organizations should prioritize updating TensorFlow to version 2.10.0 or later, or apply the backported patches available for versions 2.7.2, 2.8.1, and 2.9.1. Given the absence of workarounds, patching is the primary mitigation strategy. Organizations should conduct an inventory of all TensorFlow deployments, including embedded systems and containerized environments, to identify affected versions. For environments where immediate patching is not feasible, implementing input validation and sanitization to ensure that values passed to `RangeSize` do not exceed `int64_t` limits can reduce the risk of triggering the overflow. Monitoring application logs and TensorFlow error reports for crashes related to `RangeSize` can help detect exploitation attempts or accidental triggers. Additionally, organizations should review their machine learning pipelines to isolate TensorFlow processes and implement failover mechanisms to maintain service availability in case of crashes. Security teams should also stay updated on TensorFlow security advisories and subscribe to relevant threat intelligence feeds to respond promptly to any emerging exploits.

Need more detailed analysis?Upgrade to Pro Console

Technical Details

Data Version
5.1
Assigner Short Name
GitHub_M
Date Reserved
2022-07-15T00:00:00.000Z
Cisa Enriched
true

Threat ID: 682d9845c4522896dcbf4381

Added to database: 5/21/2025, 9:09:25 AM

Last enriched: 6/22/2025, 5:22:03 PM

Last updated: 2/7/2026, 7:11:50 AM

Views: 41

Community Reviews

0 reviews

Crowdsource mitigation strategies, share intel context, and vote on the most helpful responses. Sign in to add your voice and help keep defenders ahead.

Sort by
Loading community insights…

Want to contribute mitigation steps or threat intel context? Sign in or create an account to join the community discussion.

Actions

PRO

Updates to AI analysis require Pro Console access. Upgrade inside Console → Billing.

Please log in to the Console to use AI analysis features.

Need more coverage?

Upgrade to Pro Console in Console -> Billing for AI refresh and higher limits.

For incident response and remediation, OffSeq services can help resolve threats faster.

Latest Threats