CVE-2022-36019: CWE-617: Reachable Assertion in tensorflow tensorflow
TensorFlow is an open source platform for machine learning. If `FakeQuantWithMinMaxVarsPerChannel` is given `min` or `max` tensors of a rank other than one, it results in a `CHECK` fail that can be used to trigger a denial of service attack. We have patched the issue in GitHub commit 785d67a78a1d533759fcd2f5e8d6ef778de849e0. The fix will be included in TensorFlow 2.10.0. We will also cherrypick this commit on TensorFlow 2.9.1, TensorFlow 2.8.1, and TensorFlow 2.7.2, as these are also affected and still in supported range. There are no known workarounds for this issue.
AI Analysis
Technical Summary
CVE-2022-36019 is a medium-severity vulnerability identified in TensorFlow, an open-source machine learning platform widely used for developing and deploying machine learning models. The vulnerability arises from a reachable assertion failure (CWE-617) within the FakeQuantWithMinMaxVarsPerChannel operation. Specifically, when the 'min' or 'max' tensors provided to this operation have a rank other than one, an internal CHECK assertion fails, causing the TensorFlow process to terminate unexpectedly. This results in a denial of service (DoS) condition. The issue affects TensorFlow versions prior to 2.7.2, versions 2.8.0 up to but not including 2.8.1, and versions 2.9.0 up to but not including 2.9.1. The vulnerability was patched in commit 785d67a78a1d533759fcd2f5e8d6ef778de849e0, with fixes backported to supported versions 2.7.2, 2.8.1, and 2.9.1. There are no known workarounds, and no exploits have been reported in the wild. The vulnerability requires that an attacker supply malformed input tensors to trigger the assertion failure, which implies that the attacker must have the ability to influence the input data to the affected TensorFlow operation. The impact is limited to denial of service through process termination, with no direct indication of confidentiality or integrity compromise. The vulnerability does not require authentication but does require user interaction in the form of feeding crafted input data to the TensorFlow model or system using the vulnerable operation.
Potential Impact
For European organizations, the primary impact of CVE-2022-36019 is the potential disruption of machine learning workloads that rely on affected TensorFlow versions. Organizations using TensorFlow in production environments for critical applications—such as financial services, healthcare, manufacturing, or public sector AI initiatives—may experience service interruptions or system crashes if malicious or malformed inputs are processed. This could lead to downtime, loss of availability of AI-driven services, and potential operational delays. Since TensorFlow is often integrated into larger AI pipelines, the denial of service could cascade, affecting dependent systems and services. However, there is no evidence that this vulnerability leads to data breaches or unauthorized data manipulation. The lack of known exploits reduces immediate risk, but the widespread use of TensorFlow in Europe means that unpatched systems remain vulnerable to accidental or intentional disruption. Organizations relying on automated AI inference or training pipelines should be particularly cautious, as denial of service could impact business continuity and service level agreements.
Mitigation Recommendations
1. Upgrade TensorFlow to version 2.7.2, 2.8.1, 2.9.1, or later where the patch has been applied. This is the most effective mitigation. 2. Review and validate all input tensors to the FakeQuantWithMinMaxVarsPerChannel operation to ensure they conform to expected rank and shape constraints before processing. Implement input validation checks in the application layer to prevent malformed tensors from reaching TensorFlow. 3. Employ runtime monitoring and alerting for unexpected TensorFlow process crashes or assertion failures to enable rapid detection and response. 4. For environments where immediate upgrade is not feasible, isolate TensorFlow workloads to limit the blast radius of potential denial of service, such as containerization or sandboxing. 5. Incorporate fuzz testing or static analysis tools in the development pipeline to detect similar assertion failures or malformed input handling issues proactively. 6. Engage with TensorFlow community and security advisories to stay informed about further patches or related vulnerabilities.
Affected Countries
Germany, France, United Kingdom, Netherlands, Sweden, Finland, Italy, Spain, Poland
CVE-2022-36019: CWE-617: Reachable Assertion in tensorflow tensorflow
Description
TensorFlow is an open source platform for machine learning. If `FakeQuantWithMinMaxVarsPerChannel` is given `min` or `max` tensors of a rank other than one, it results in a `CHECK` fail that can be used to trigger a denial of service attack. We have patched the issue in GitHub commit 785d67a78a1d533759fcd2f5e8d6ef778de849e0. The fix will be included in TensorFlow 2.10.0. We will also cherrypick this commit on TensorFlow 2.9.1, TensorFlow 2.8.1, and TensorFlow 2.7.2, as these are also affected and still in supported range. There are no known workarounds for this issue.
AI-Powered Analysis
Technical Analysis
CVE-2022-36019 is a medium-severity vulnerability identified in TensorFlow, an open-source machine learning platform widely used for developing and deploying machine learning models. The vulnerability arises from a reachable assertion failure (CWE-617) within the FakeQuantWithMinMaxVarsPerChannel operation. Specifically, when the 'min' or 'max' tensors provided to this operation have a rank other than one, an internal CHECK assertion fails, causing the TensorFlow process to terminate unexpectedly. This results in a denial of service (DoS) condition. The issue affects TensorFlow versions prior to 2.7.2, versions 2.8.0 up to but not including 2.8.1, and versions 2.9.0 up to but not including 2.9.1. The vulnerability was patched in commit 785d67a78a1d533759fcd2f5e8d6ef778de849e0, with fixes backported to supported versions 2.7.2, 2.8.1, and 2.9.1. There are no known workarounds, and no exploits have been reported in the wild. The vulnerability requires that an attacker supply malformed input tensors to trigger the assertion failure, which implies that the attacker must have the ability to influence the input data to the affected TensorFlow operation. The impact is limited to denial of service through process termination, with no direct indication of confidentiality or integrity compromise. The vulnerability does not require authentication but does require user interaction in the form of feeding crafted input data to the TensorFlow model or system using the vulnerable operation.
Potential Impact
For European organizations, the primary impact of CVE-2022-36019 is the potential disruption of machine learning workloads that rely on affected TensorFlow versions. Organizations using TensorFlow in production environments for critical applications—such as financial services, healthcare, manufacturing, or public sector AI initiatives—may experience service interruptions or system crashes if malicious or malformed inputs are processed. This could lead to downtime, loss of availability of AI-driven services, and potential operational delays. Since TensorFlow is often integrated into larger AI pipelines, the denial of service could cascade, affecting dependent systems and services. However, there is no evidence that this vulnerability leads to data breaches or unauthorized data manipulation. The lack of known exploits reduces immediate risk, but the widespread use of TensorFlow in Europe means that unpatched systems remain vulnerable to accidental or intentional disruption. Organizations relying on automated AI inference or training pipelines should be particularly cautious, as denial of service could impact business continuity and service level agreements.
Mitigation Recommendations
1. Upgrade TensorFlow to version 2.7.2, 2.8.1, 2.9.1, or later where the patch has been applied. This is the most effective mitigation. 2. Review and validate all input tensors to the FakeQuantWithMinMaxVarsPerChannel operation to ensure they conform to expected rank and shape constraints before processing. Implement input validation checks in the application layer to prevent malformed tensors from reaching TensorFlow. 3. Employ runtime monitoring and alerting for unexpected TensorFlow process crashes or assertion failures to enable rapid detection and response. 4. For environments where immediate upgrade is not feasible, isolate TensorFlow workloads to limit the blast radius of potential denial of service, such as containerization or sandboxing. 5. Incorporate fuzz testing or static analysis tools in the development pipeline to detect similar assertion failures or malformed input handling issues proactively. 6. Engage with TensorFlow community and security advisories to stay informed about further patches or related vulnerabilities.
Affected Countries
For access to advanced analysis and higher rate limits, contact root@offseq.com
Technical Details
- Data Version
- 5.1
- Assigner Short Name
- GitHub_M
- Date Reserved
- 2022-07-15T00:00:00.000Z
- Cisa Enriched
- true
Threat ID: 682d9845c4522896dcbf439e
Added to database: 5/21/2025, 9:09:25 AM
Last enriched: 6/22/2025, 5:20:56 PM
Last updated: 8/18/2025, 4:27:58 AM
Views: 12
Related Threats
CVE-2025-53948: CWE-415 Double Free in Santesoft Sante PACS Server
HighCVE-2025-52584: CWE-122 Heap-based Buffer Overflow in Ashlar-Vellum Cobalt
HighCVE-2025-46269: CWE-122 Heap-based Buffer Overflow in Ashlar-Vellum Cobalt
HighCVE-2025-54862: CWE-79 Improper Neutralization of Input During Web Page Generation (XSS or 'Cross-site Scripting') in Santesoft Sante PACS Server
MediumCVE-2025-54759: CWE-79 Improper Neutralization of Input During Web Page Generation (XSS or 'Cross-site Scripting') in Santesoft Sante PACS Server
MediumActions
Updates to AI analysis are available only with a Pro account. Contact root@offseq.com for access.
External Links
Need enhanced features?
Contact root@offseq.com for Pro access with improved analysis and higher rate limits.