CVE-2022-36026: CWE-617: Reachable Assertion in tensorflow tensorflow
TensorFlow is an open source platform for machine learning. If `QuantizeAndDequantizeV3` is given a nonscalar `num_bits` input tensor, it results in a `CHECK` fail that can be used to trigger a denial of service attack. We have patched the issue in GitHub commit f3f9cb38ecfe5a8a703f2c4a8fead434ef291713. The fix will be included in TensorFlow 2.10.0. We will also cherrypick this commit on TensorFlow 2.9.1, TensorFlow 2.8.1, and TensorFlow 2.7.2, as these are also affected and still in supported range. There are no known workarounds for this issue.
AI Analysis
Technical Summary
CVE-2022-36026 is a vulnerability identified in TensorFlow, an open-source machine learning platform widely used for developing and deploying machine learning models. The flaw arises in the `QuantizeAndDequantizeV3` operation, which is responsible for quantization and dequantization of tensors during model processing. Specifically, if the `num_bits` input tensor to this operation is provided as a nonscalar (i.e., a tensor with more than one element or dimensions rather than a single scalar value), it triggers a `CHECK` failure within TensorFlow's internal assertion mechanisms. This failure leads to a reachable assertion error (CWE-617), causing the TensorFlow process to crash, effectively resulting in a denial of service (DoS) condition. The vulnerability affects multiple TensorFlow versions: all versions prior to 2.7.2, versions 2.8.0 up to but not including 2.8.1, and versions 2.9.0 up to but not including 2.9.1. The issue was patched in commit f3f9cb38ecfe5a8a703f2c4a8fead434ef291713 and incorporated into TensorFlow 2.10.0, with backports planned for 2.9.1, 2.8.1, and 2.7.2. There are no known workarounds, and no exploits have been reported in the wild to date. The vulnerability requires an attacker to supply malformed input data to the TensorFlow process, but does not require authentication or user interaction beyond the processing of crafted inputs. The impact is limited to denial of service, as no code execution or data leakage has been reported. This vulnerability is primarily a stability and availability concern for systems running vulnerable TensorFlow versions, especially those exposed to untrusted input data streams or APIs that process machine learning models dynamically.
Potential Impact
For European organizations, the primary impact of CVE-2022-36026 is the potential disruption of machine learning services relying on vulnerable TensorFlow versions. This could affect sectors such as finance, healthcare, automotive, and manufacturing, where TensorFlow is used for predictive analytics, diagnostics, autonomous systems, or quality control. A denial of service attack exploiting this vulnerability could lead to temporary unavailability of critical AI-driven applications, causing operational delays, loss of productivity, and potential financial losses. Organizations deploying TensorFlow in cloud environments or exposed APIs are at higher risk, as attackers could remotely trigger the assertion failure by submitting crafted inputs. Although no data breach or code execution is possible, the interruption of AI services could degrade customer trust and impact business continuity. Additionally, organizations involved in AI research or providing AI-as-a-service could face reputational damage if their services are disrupted. Given the lack of known exploits, the immediate threat is moderate, but the widespread use of TensorFlow in Europe means that unpatched systems remain vulnerable to accidental crashes or targeted DoS attempts.
Mitigation Recommendations
To mitigate CVE-2022-36026, European organizations should prioritize updating TensorFlow installations to versions 2.7.2, 2.8.1, 2.9.1, or later, where the patch has been applied. For environments where immediate upgrading is not feasible, organizations should implement strict input validation and sanitization on all data fed into TensorFlow models, ensuring that the `num_bits` parameter for quantization operations is always a scalar value. Deploying runtime monitoring to detect and alert on TensorFlow process crashes can help in early detection of exploitation attempts. Additionally, isolating TensorFlow workloads in containerized or sandboxed environments can limit the impact of crashes on broader systems. Organizations should review their machine learning pipelines to identify any external or untrusted data sources feeding into TensorFlow and apply network-level controls or API gateways to restrict malformed inputs. Finally, maintaining an inventory of TensorFlow versions in use across the enterprise and integrating vulnerability scanning into CI/CD pipelines will help prevent deployment of vulnerable versions in the future.
Affected Countries
Germany, France, United Kingdom, Netherlands, Sweden, Finland, Italy, Spain, Poland, Belgium
CVE-2022-36026: CWE-617: Reachable Assertion in tensorflow tensorflow
Description
TensorFlow is an open source platform for machine learning. If `QuantizeAndDequantizeV3` is given a nonscalar `num_bits` input tensor, it results in a `CHECK` fail that can be used to trigger a denial of service attack. We have patched the issue in GitHub commit f3f9cb38ecfe5a8a703f2c4a8fead434ef291713. The fix will be included in TensorFlow 2.10.0. We will also cherrypick this commit on TensorFlow 2.9.1, TensorFlow 2.8.1, and TensorFlow 2.7.2, as these are also affected and still in supported range. There are no known workarounds for this issue.
AI-Powered Analysis
Technical Analysis
CVE-2022-36026 is a vulnerability identified in TensorFlow, an open-source machine learning platform widely used for developing and deploying machine learning models. The flaw arises in the `QuantizeAndDequantizeV3` operation, which is responsible for quantization and dequantization of tensors during model processing. Specifically, if the `num_bits` input tensor to this operation is provided as a nonscalar (i.e., a tensor with more than one element or dimensions rather than a single scalar value), it triggers a `CHECK` failure within TensorFlow's internal assertion mechanisms. This failure leads to a reachable assertion error (CWE-617), causing the TensorFlow process to crash, effectively resulting in a denial of service (DoS) condition. The vulnerability affects multiple TensorFlow versions: all versions prior to 2.7.2, versions 2.8.0 up to but not including 2.8.1, and versions 2.9.0 up to but not including 2.9.1. The issue was patched in commit f3f9cb38ecfe5a8a703f2c4a8fead434ef291713 and incorporated into TensorFlow 2.10.0, with backports planned for 2.9.1, 2.8.1, and 2.7.2. There are no known workarounds, and no exploits have been reported in the wild to date. The vulnerability requires an attacker to supply malformed input data to the TensorFlow process, but does not require authentication or user interaction beyond the processing of crafted inputs. The impact is limited to denial of service, as no code execution or data leakage has been reported. This vulnerability is primarily a stability and availability concern for systems running vulnerable TensorFlow versions, especially those exposed to untrusted input data streams or APIs that process machine learning models dynamically.
Potential Impact
For European organizations, the primary impact of CVE-2022-36026 is the potential disruption of machine learning services relying on vulnerable TensorFlow versions. This could affect sectors such as finance, healthcare, automotive, and manufacturing, where TensorFlow is used for predictive analytics, diagnostics, autonomous systems, or quality control. A denial of service attack exploiting this vulnerability could lead to temporary unavailability of critical AI-driven applications, causing operational delays, loss of productivity, and potential financial losses. Organizations deploying TensorFlow in cloud environments or exposed APIs are at higher risk, as attackers could remotely trigger the assertion failure by submitting crafted inputs. Although no data breach or code execution is possible, the interruption of AI services could degrade customer trust and impact business continuity. Additionally, organizations involved in AI research or providing AI-as-a-service could face reputational damage if their services are disrupted. Given the lack of known exploits, the immediate threat is moderate, but the widespread use of TensorFlow in Europe means that unpatched systems remain vulnerable to accidental crashes or targeted DoS attempts.
Mitigation Recommendations
To mitigate CVE-2022-36026, European organizations should prioritize updating TensorFlow installations to versions 2.7.2, 2.8.1, 2.9.1, or later, where the patch has been applied. For environments where immediate upgrading is not feasible, organizations should implement strict input validation and sanitization on all data fed into TensorFlow models, ensuring that the `num_bits` parameter for quantization operations is always a scalar value. Deploying runtime monitoring to detect and alert on TensorFlow process crashes can help in early detection of exploitation attempts. Additionally, isolating TensorFlow workloads in containerized or sandboxed environments can limit the impact of crashes on broader systems. Organizations should review their machine learning pipelines to identify any external or untrusted data sources feeding into TensorFlow and apply network-level controls or API gateways to restrict malformed inputs. Finally, maintaining an inventory of TensorFlow versions in use across the enterprise and integrating vulnerability scanning into CI/CD pipelines will help prevent deployment of vulnerable versions in the future.
For access to advanced analysis and higher rate limits, contact root@offseq.com
Technical Details
- Data Version
- 5.1
- Assigner Short Name
- GitHub_M
- Date Reserved
- 2022-07-15T00:00:00.000Z
- Cisa Enriched
- true
Threat ID: 682d9845c4522896dcbf43ae
Added to database: 5/21/2025, 9:09:25 AM
Last enriched: 6/22/2025, 5:20:30 PM
Last updated: 8/6/2025, 6:45:18 PM
Views: 11
Related Threats
CVE-2025-36023: CWE-639 Authorization Bypass Through User-Controlled Key in IBM Cloud Pak for Business Automation
MediumCVE-2025-8730: Hard-coded Credentials in Belkin F9K1009
CriticalCVE-2025-36119: CWE-290 Authentication Bypass by Spoofing
HighCVE-2025-22963: CWE-352 Cross-Site Request Forgery (CSRF) in Sismics Teedy
HighCVE-2025-8729: Path Traversal in MigoXLab LMeterX
MediumActions
Updates to AI analysis are available only with a Pro account. Contact root@offseq.com for access.
External Links
Need enhanced features?
Contact root@offseq.com for Pro access with improved analysis and higher rate limits.