CVE-2022-36016: CWE-617: Reachable Assertion in tensorflow tensorflow
TensorFlow is an open source platform for machine learning. When `tensorflow::full_type::SubstituteFromAttrs` receives a `FullTypeDef& t` that is not exactly three args, it triggers a `CHECK`-fail instead of returning a status. We have patched the issue in GitHub commit 6104f0d4091c260ce9352f9155f7e9b725eab012. The fix will be included in TensorFlow 2.10.0. We will also cherrypick this commit on TensorFlow 2.9.1, TensorFlow 2.8.1, and TensorFlow 2.7.2, as these are also affected and still in supported range. There are no known workarounds for this issue.
AI Analysis
Technical Summary
CVE-2022-36016 is a medium-severity vulnerability affecting TensorFlow, an open-source machine learning platform widely used for developing and deploying machine learning models. The issue arises in the function tensorflow::full_type::SubstituteFromAttrs, which processes FullTypeDef objects. Specifically, when this function receives a FullTypeDef reference 't' that does not contain exactly three arguments, it triggers a CHECK-fail assertion instead of gracefully returning an error status. This reachable assertion leads to an abnormal termination of the TensorFlow process, effectively causing a denial-of-service (DoS) condition. The vulnerability is present in TensorFlow versions prior to 2.7.2, and in minor versions 2.8.0 to 2.8.1, and 2.9.0 to 2.9.1. The issue has been patched in TensorFlow 2.10.0 and backported to supported versions 2.7.2, 2.8.1, and 2.9.1. No known workarounds exist, and no exploits have been reported in the wild. The root cause is a reachable assertion (CWE-617), which is a programming error where an assertion can be triggered by crafted input, leading to process termination. This vulnerability does not appear to allow code execution or data corruption but can disrupt availability by crashing TensorFlow processes that handle malformed FullTypeDef inputs. Given TensorFlow's extensive use in AI/ML workloads, especially in production environments, this vulnerability could impact services relying on TensorFlow for inference or training if untrusted or malformed inputs are processed. The vulnerability requires that the attacker can supply or influence the FullTypeDef input to the SubstituteFromAttrs function, which may require some level of access or interaction with the TensorFlow environment or data pipeline. No authentication or user interaction is explicitly required if the attacker can control the input data. The vulnerability is primarily a denial-of-service vector rather than a direct confidentiality or integrity compromise.
Potential Impact
For European organizations, the primary impact of CVE-2022-36016 is the potential disruption of machine learning services that rely on affected TensorFlow versions. This could lead to denial-of-service conditions in AI-driven applications, including predictive analytics, automated decision-making systems, and real-time inference services. Industries such as finance, healthcare, automotive, and manufacturing, which increasingly depend on AI/ML for critical operations, may experience service outages or degraded performance. The vulnerability could also affect research institutions and technology companies using TensorFlow for development and experimentation, causing interruptions in workflows. While the vulnerability does not directly expose sensitive data or allow unauthorized code execution, the loss of availability can have cascading effects, such as delayed processing, loss of trust in AI systems, and potential regulatory compliance issues if service level agreements (SLAs) are violated. Given the lack of known exploits, the immediate threat is moderate; however, the widespread adoption of TensorFlow in Europe means that unpatched systems remain at risk of accidental or intentional triggering of the assertion, especially in environments processing untrusted or external data inputs.
Mitigation Recommendations
European organizations should prioritize updating TensorFlow installations to the patched versions: 2.7.2, 2.8.1, 2.9.1, or later (including 2.10.0). Since no workarounds exist, patching is the primary mitigation. Additionally, organizations should implement strict input validation and sanitization for any data or model definitions that could influence FullTypeDef structures to prevent malformed inputs from reaching the vulnerable function. Deploying runtime monitoring to detect unexpected TensorFlow process crashes can help identify exploitation attempts or accidental triggers. For production environments, consider isolating TensorFlow workloads in containerized or sandboxed environments to limit the impact of crashes on broader systems. Incorporate robust logging and alerting mechanisms to capture assertion failures and enable rapid incident response. Finally, review and restrict access controls to TensorFlow model deployment pipelines to minimize the risk of untrusted input injection. Organizations should also maintain an inventory of TensorFlow versions in use across their infrastructure to ensure timely patch management.
Affected Countries
Germany, France, United Kingdom, Netherlands, Sweden, Finland, Italy, Spain, Poland, Belgium
CVE-2022-36016: CWE-617: Reachable Assertion in tensorflow tensorflow
Description
TensorFlow is an open source platform for machine learning. When `tensorflow::full_type::SubstituteFromAttrs` receives a `FullTypeDef& t` that is not exactly three args, it triggers a `CHECK`-fail instead of returning a status. We have patched the issue in GitHub commit 6104f0d4091c260ce9352f9155f7e9b725eab012. The fix will be included in TensorFlow 2.10.0. We will also cherrypick this commit on TensorFlow 2.9.1, TensorFlow 2.8.1, and TensorFlow 2.7.2, as these are also affected and still in supported range. There are no known workarounds for this issue.
AI-Powered Analysis
Technical Analysis
CVE-2022-36016 is a medium-severity vulnerability affecting TensorFlow, an open-source machine learning platform widely used for developing and deploying machine learning models. The issue arises in the function tensorflow::full_type::SubstituteFromAttrs, which processes FullTypeDef objects. Specifically, when this function receives a FullTypeDef reference 't' that does not contain exactly three arguments, it triggers a CHECK-fail assertion instead of gracefully returning an error status. This reachable assertion leads to an abnormal termination of the TensorFlow process, effectively causing a denial-of-service (DoS) condition. The vulnerability is present in TensorFlow versions prior to 2.7.2, and in minor versions 2.8.0 to 2.8.1, and 2.9.0 to 2.9.1. The issue has been patched in TensorFlow 2.10.0 and backported to supported versions 2.7.2, 2.8.1, and 2.9.1. No known workarounds exist, and no exploits have been reported in the wild. The root cause is a reachable assertion (CWE-617), which is a programming error where an assertion can be triggered by crafted input, leading to process termination. This vulnerability does not appear to allow code execution or data corruption but can disrupt availability by crashing TensorFlow processes that handle malformed FullTypeDef inputs. Given TensorFlow's extensive use in AI/ML workloads, especially in production environments, this vulnerability could impact services relying on TensorFlow for inference or training if untrusted or malformed inputs are processed. The vulnerability requires that the attacker can supply or influence the FullTypeDef input to the SubstituteFromAttrs function, which may require some level of access or interaction with the TensorFlow environment or data pipeline. No authentication or user interaction is explicitly required if the attacker can control the input data. The vulnerability is primarily a denial-of-service vector rather than a direct confidentiality or integrity compromise.
Potential Impact
For European organizations, the primary impact of CVE-2022-36016 is the potential disruption of machine learning services that rely on affected TensorFlow versions. This could lead to denial-of-service conditions in AI-driven applications, including predictive analytics, automated decision-making systems, and real-time inference services. Industries such as finance, healthcare, automotive, and manufacturing, which increasingly depend on AI/ML for critical operations, may experience service outages or degraded performance. The vulnerability could also affect research institutions and technology companies using TensorFlow for development and experimentation, causing interruptions in workflows. While the vulnerability does not directly expose sensitive data or allow unauthorized code execution, the loss of availability can have cascading effects, such as delayed processing, loss of trust in AI systems, and potential regulatory compliance issues if service level agreements (SLAs) are violated. Given the lack of known exploits, the immediate threat is moderate; however, the widespread adoption of TensorFlow in Europe means that unpatched systems remain at risk of accidental or intentional triggering of the assertion, especially in environments processing untrusted or external data inputs.
Mitigation Recommendations
European organizations should prioritize updating TensorFlow installations to the patched versions: 2.7.2, 2.8.1, 2.9.1, or later (including 2.10.0). Since no workarounds exist, patching is the primary mitigation. Additionally, organizations should implement strict input validation and sanitization for any data or model definitions that could influence FullTypeDef structures to prevent malformed inputs from reaching the vulnerable function. Deploying runtime monitoring to detect unexpected TensorFlow process crashes can help identify exploitation attempts or accidental triggers. For production environments, consider isolating TensorFlow workloads in containerized or sandboxed environments to limit the impact of crashes on broader systems. Incorporate robust logging and alerting mechanisms to capture assertion failures and enable rapid incident response. Finally, review and restrict access controls to TensorFlow model deployment pipelines to minimize the risk of untrusted input injection. Organizations should also maintain an inventory of TensorFlow versions in use across their infrastructure to ensure timely patch management.
For access to advanced analysis and higher rate limits, contact root@offseq.com
Technical Details
- Data Version
- 5.1
- Assigner Short Name
- GitHub_M
- Date Reserved
- 2022-07-15T00:00:00.000Z
- Cisa Enriched
- true
Threat ID: 682d9845c4522896dcbf438e
Added to database: 5/21/2025, 9:09:25 AM
Last enriched: 6/22/2025, 5:21:48 PM
Last updated: 8/12/2025, 8:42:52 AM
Views: 11
Related Threats
CVE-2025-53948: CWE-415 Double Free in Santesoft Sante PACS Server
HighCVE-2025-52584: CWE-122 Heap-based Buffer Overflow in Ashlar-Vellum Cobalt
HighCVE-2025-46269: CWE-122 Heap-based Buffer Overflow in Ashlar-Vellum Cobalt
HighCVE-2025-54862: CWE-79 Improper Neutralization of Input During Web Page Generation (XSS or 'Cross-site Scripting') in Santesoft Sante PACS Server
MediumCVE-2025-54759: CWE-79 Improper Neutralization of Input During Web Page Generation (XSS or 'Cross-site Scripting') in Santesoft Sante PACS Server
MediumActions
Updates to AI analysis are available only with a Pro account. Contact root@offseq.com for access.
External Links
Need enhanced features?
Contact root@offseq.com for Pro access with improved analysis and higher rate limits.