Skip to main content

CVE-2022-36019: CWE-617: Reachable Assertion in tensorflow tensorflow

Medium
Published: Fri Sep 16 2022 (09/16/2022, 22:05:10 UTC)
Source: CVE
Vendor/Project: tensorflow
Product: tensorflow

Description

TensorFlow is an open source platform for machine learning. If `FakeQuantWithMinMaxVarsPerChannel` is given `min` or `max` tensors of a rank other than one, it results in a `CHECK` fail that can be used to trigger a denial of service attack. We have patched the issue in GitHub commit 785d67a78a1d533759fcd2f5e8d6ef778de849e0. The fix will be included in TensorFlow 2.10.0. We will also cherrypick this commit on TensorFlow 2.9.1, TensorFlow 2.8.1, and TensorFlow 2.7.2, as these are also affected and still in supported range. There are no known workarounds for this issue.

AI-Powered Analysis

AILast updated: 06/22/2025, 17:20:56 UTC

Technical Analysis

CVE-2022-36019 is a medium-severity vulnerability identified in TensorFlow, an open-source machine learning platform widely used for developing and deploying machine learning models. The vulnerability arises from a reachable assertion failure (CWE-617) within the FakeQuantWithMinMaxVarsPerChannel operation. Specifically, when the 'min' or 'max' tensors provided to this operation have a rank other than one, an internal CHECK assertion fails, causing the TensorFlow process to terminate unexpectedly. This results in a denial of service (DoS) condition. The issue affects TensorFlow versions prior to 2.7.2, versions 2.8.0 up to but not including 2.8.1, and versions 2.9.0 up to but not including 2.9.1. The vulnerability was patched in commit 785d67a78a1d533759fcd2f5e8d6ef778de849e0, with fixes backported to supported versions 2.7.2, 2.8.1, and 2.9.1. There are no known workarounds, and no exploits have been reported in the wild. The vulnerability requires that an attacker supply malformed input tensors to trigger the assertion failure, which implies that the attacker must have the ability to influence the input data to the affected TensorFlow operation. The impact is limited to denial of service through process termination, with no direct indication of confidentiality or integrity compromise. The vulnerability does not require authentication but does require user interaction in the form of feeding crafted input data to the TensorFlow model or system using the vulnerable operation.

Potential Impact

For European organizations, the primary impact of CVE-2022-36019 is the potential disruption of machine learning workloads that rely on affected TensorFlow versions. Organizations using TensorFlow in production environments for critical applications—such as financial services, healthcare, manufacturing, or public sector AI initiatives—may experience service interruptions or system crashes if malicious or malformed inputs are processed. This could lead to downtime, loss of availability of AI-driven services, and potential operational delays. Since TensorFlow is often integrated into larger AI pipelines, the denial of service could cascade, affecting dependent systems and services. However, there is no evidence that this vulnerability leads to data breaches or unauthorized data manipulation. The lack of known exploits reduces immediate risk, but the widespread use of TensorFlow in Europe means that unpatched systems remain vulnerable to accidental or intentional disruption. Organizations relying on automated AI inference or training pipelines should be particularly cautious, as denial of service could impact business continuity and service level agreements.

Mitigation Recommendations

1. Upgrade TensorFlow to version 2.7.2, 2.8.1, 2.9.1, or later where the patch has been applied. This is the most effective mitigation. 2. Review and validate all input tensors to the FakeQuantWithMinMaxVarsPerChannel operation to ensure they conform to expected rank and shape constraints before processing. Implement input validation checks in the application layer to prevent malformed tensors from reaching TensorFlow. 3. Employ runtime monitoring and alerting for unexpected TensorFlow process crashes or assertion failures to enable rapid detection and response. 4. For environments where immediate upgrade is not feasible, isolate TensorFlow workloads to limit the blast radius of potential denial of service, such as containerization or sandboxing. 5. Incorporate fuzz testing or static analysis tools in the development pipeline to detect similar assertion failures or malformed input handling issues proactively. 6. Engage with TensorFlow community and security advisories to stay informed about further patches or related vulnerabilities.

Need more detailed analysis?Get Pro

Technical Details

Data Version
5.1
Assigner Short Name
GitHub_M
Date Reserved
2022-07-15T00:00:00.000Z
Cisa Enriched
true

Threat ID: 682d9845c4522896dcbf439e

Added to database: 5/21/2025, 9:09:25 AM

Last enriched: 6/22/2025, 5:20:56 PM

Last updated: 8/18/2025, 4:27:58 AM

Views: 12

Actions

PRO

Updates to AI analysis are available only with a Pro account. Contact root@offseq.com for access.

Please log in to the Console to use AI analysis features.

Need enhanced features?

Contact root@offseq.com for Pro access with improved analysis and higher rate limits.

Latest Threats