Skip to main content

CVE-2022-36026: CWE-617: Reachable Assertion in tensorflow tensorflow

Medium
Published: Fri Sep 16 2022 (09/16/2022, 22:05:20 UTC)
Source: CVE
Vendor/Project: tensorflow
Product: tensorflow

Description

TensorFlow is an open source platform for machine learning. If `QuantizeAndDequantizeV3` is given a nonscalar `num_bits` input tensor, it results in a `CHECK` fail that can be used to trigger a denial of service attack. We have patched the issue in GitHub commit f3f9cb38ecfe5a8a703f2c4a8fead434ef291713. The fix will be included in TensorFlow 2.10.0. We will also cherrypick this commit on TensorFlow 2.9.1, TensorFlow 2.8.1, and TensorFlow 2.7.2, as these are also affected and still in supported range. There are no known workarounds for this issue.

AI-Powered Analysis

AILast updated: 06/22/2025, 17:20:30 UTC

Technical Analysis

CVE-2022-36026 is a vulnerability identified in TensorFlow, an open-source machine learning platform widely used for developing and deploying machine learning models. The flaw arises in the `QuantizeAndDequantizeV3` operation, which is responsible for quantization and dequantization of tensors during model processing. Specifically, if the `num_bits` input tensor to this operation is provided as a nonscalar (i.e., a tensor with more than one element or dimensions rather than a single scalar value), it triggers a `CHECK` failure within TensorFlow's internal assertion mechanisms. This failure leads to a reachable assertion error (CWE-617), causing the TensorFlow process to crash, effectively resulting in a denial of service (DoS) condition. The vulnerability affects multiple TensorFlow versions: all versions prior to 2.7.2, versions 2.8.0 up to but not including 2.8.1, and versions 2.9.0 up to but not including 2.9.1. The issue was patched in commit f3f9cb38ecfe5a8a703f2c4a8fead434ef291713 and incorporated into TensorFlow 2.10.0, with backports planned for 2.9.1, 2.8.1, and 2.7.2. There are no known workarounds, and no exploits have been reported in the wild to date. The vulnerability requires an attacker to supply malformed input data to the TensorFlow process, but does not require authentication or user interaction beyond the processing of crafted inputs. The impact is limited to denial of service, as no code execution or data leakage has been reported. This vulnerability is primarily a stability and availability concern for systems running vulnerable TensorFlow versions, especially those exposed to untrusted input data streams or APIs that process machine learning models dynamically.

Potential Impact

For European organizations, the primary impact of CVE-2022-36026 is the potential disruption of machine learning services relying on vulnerable TensorFlow versions. This could affect sectors such as finance, healthcare, automotive, and manufacturing, where TensorFlow is used for predictive analytics, diagnostics, autonomous systems, or quality control. A denial of service attack exploiting this vulnerability could lead to temporary unavailability of critical AI-driven applications, causing operational delays, loss of productivity, and potential financial losses. Organizations deploying TensorFlow in cloud environments or exposed APIs are at higher risk, as attackers could remotely trigger the assertion failure by submitting crafted inputs. Although no data breach or code execution is possible, the interruption of AI services could degrade customer trust and impact business continuity. Additionally, organizations involved in AI research or providing AI-as-a-service could face reputational damage if their services are disrupted. Given the lack of known exploits, the immediate threat is moderate, but the widespread use of TensorFlow in Europe means that unpatched systems remain vulnerable to accidental crashes or targeted DoS attempts.

Mitigation Recommendations

To mitigate CVE-2022-36026, European organizations should prioritize updating TensorFlow installations to versions 2.7.2, 2.8.1, 2.9.1, or later, where the patch has been applied. For environments where immediate upgrading is not feasible, organizations should implement strict input validation and sanitization on all data fed into TensorFlow models, ensuring that the `num_bits` parameter for quantization operations is always a scalar value. Deploying runtime monitoring to detect and alert on TensorFlow process crashes can help in early detection of exploitation attempts. Additionally, isolating TensorFlow workloads in containerized or sandboxed environments can limit the impact of crashes on broader systems. Organizations should review their machine learning pipelines to identify any external or untrusted data sources feeding into TensorFlow and apply network-level controls or API gateways to restrict malformed inputs. Finally, maintaining an inventory of TensorFlow versions in use across the enterprise and integrating vulnerability scanning into CI/CD pipelines will help prevent deployment of vulnerable versions in the future.

Need more detailed analysis?Get Pro

Technical Details

Data Version
5.1
Assigner Short Name
GitHub_M
Date Reserved
2022-07-15T00:00:00.000Z
Cisa Enriched
true

Threat ID: 682d9845c4522896dcbf43ae

Added to database: 5/21/2025, 9:09:25 AM

Last enriched: 6/22/2025, 5:20:30 PM

Last updated: 8/6/2025, 6:45:18 PM

Views: 11

Actions

PRO

Updates to AI analysis are available only with a Pro account. Contact root@offseq.com for access.

Please log in to the Console to use AI analysis features.

Need enhanced features?

Contact root@offseq.com for Pro access with improved analysis and higher rate limits.

Latest Threats