Skip to main content
Press slash or control plus K to focus the search. Use the arrow keys to navigate results and press enter to open a threat.
Reconnecting to live updates…

CVE-2022-36027: CWE-20: Improper Input Validation in tensorflow tensorflow

0
Medium
Published: Fri Sep 16 2022 (09/16/2022, 22:50:16 UTC)
Source: CVE
Vendor/Project: tensorflow
Product: tensorflow

Description

TensorFlow is an open source platform for machine learning. When converting transposed convolutions using per-channel weight quantization the converter segfaults and crashes the Python process. We have patched the issue in GitHub commit aa0b852a4588cea4d36b74feb05d93055540b450. The fix will be included in TensorFlow 2.10.0. We will also cherrypick this commit on TensorFlow 2.9.1, TensorFlow 2.8.1, and TensorFlow 2.7.2, as these are also affected and still in supported range. There are no known workarounds for this issue.

AI-Powered Analysis

AILast updated: 06/21/2025, 23:42:31 UTC

Technical Analysis

CVE-2022-36027 is a medium-severity vulnerability in TensorFlow, an open-source machine learning platform widely used for developing and deploying machine learning models. The vulnerability arises from improper input validation (CWE-20) during the conversion process of transposed convolutions when using per-channel weight quantization. Specifically, when TensorFlow attempts to convert these transposed convolutions, the converter can encounter unexpected input data that causes a segmentation fault (segfault), leading to a crash of the Python process running the TensorFlow code. This crash results in denial of service (DoS) conditions where the affected application or service becomes unavailable. The issue affects multiple TensorFlow versions: all versions prior to 2.7.2, versions between 2.8.0 and 2.8.1, and versions between 2.9.0 and 2.9.1. The vulnerability has been patched in TensorFlow 2.10.0 and backported to 2.7.2, 2.8.1, and 2.9.1. There are no known workarounds, and no exploits have been observed in the wild to date. The vulnerability requires that the attacker can supply crafted input data to the TensorFlow converter process, which typically implies some level of access to the environment where model conversion or deployment occurs. The impact is primarily on availability due to process crashes, but it could also disrupt machine learning workflows and services relying on TensorFlow for model conversion and deployment.

Potential Impact

For European organizations, the impact of CVE-2022-36027 can be significant in sectors relying heavily on machine learning workflows, such as finance, healthcare, automotive, and manufacturing. Organizations using TensorFlow for model training, conversion, or deployment may experience service interruptions or downtime if the vulnerability is triggered, potentially delaying critical AI-driven decision-making processes. This could affect operational continuity, especially in environments where automated model updates or conversions are part of continuous integration/continuous deployment (CI/CD) pipelines. While the vulnerability does not appear to allow remote code execution or data exfiltration, the denial of service caused by crashes can degrade system reliability and trust in AI systems. Additionally, organizations with regulatory compliance requirements around system availability and reliability (e.g., GDPR mandates on service continuity) may face compliance risks if the vulnerability is exploited or causes unplanned outages. Since no known exploits exist in the wild, the immediate threat level is moderate, but the widespread use of TensorFlow in European research institutions and enterprises means that unpatched systems remain at risk.

Mitigation Recommendations

European organizations should prioritize upgrading TensorFlow installations to version 2.10.0 or later, or apply the backported patches available in versions 2.7.2, 2.8.1, and 2.9.1. Given the lack of workarounds, patching is the primary mitigation strategy. Organizations should audit their machine learning pipelines to identify where TensorFlow model conversions occur and ensure these environments are updated promptly. Implementing strict input validation and sanitization on any user-supplied or external data fed into TensorFlow conversion processes can reduce the risk of triggering the vulnerability. Additionally, isolating the TensorFlow conversion environment using containerization or sandboxing can limit the blast radius of any crashes. Monitoring logs and system health metrics for unexpected Python process crashes related to TensorFlow can help detect exploitation attempts early. Finally, organizations should integrate TensorFlow version checks into their software asset management and vulnerability management programs to maintain ongoing awareness of vulnerable versions.

Need more detailed analysis?Upgrade to Pro Console

Technical Details

Data Version
5.1
Assigner Short Name
GitHub_M
Date Reserved
2022-07-15T00:00:00.000Z
Cisa Enriched
true

Threat ID: 682d9849c4522896dcbf68ae

Added to database: 5/21/2025, 9:09:29 AM

Last enriched: 6/21/2025, 11:42:31 PM

Last updated: 2/7/2026, 10:07:27 PM

Views: 44

Community Reviews

0 reviews

Crowdsource mitigation strategies, share intel context, and vote on the most helpful responses. Sign in to add your voice and help keep defenders ahead.

Sort by
Loading community insights…

Want to contribute mitigation steps or threat intel context? Sign in or create an account to join the community discussion.

Actions

PRO

Updates to AI analysis require Pro Console access. Upgrade inside Console → Billing.

Please log in to the Console to use AI analysis features.

Need more coverage?

Upgrade to Pro Console in Console -> Billing for AI refresh and higher limits.

For incident response and remediation, OffSeq services can help resolve threats faster.

Latest Threats