CVE-2022-41883: CWE-125: Out-of-bounds Read in tensorflow tensorflow
TensorFlow is an open source platform for machine learning. When ops that have specified input sizes receive a differing number of inputs, the executor will crash. We have patched the issue in GitHub commit f5381e0e10b5a61344109c1b7c174c68110f7629. The fix will be included in TensorFlow 2.11. We will also cherrypick this commit on TensorFlow 2.10.1, 2.9.3, and TensorFlow 2.8.4, as these are also affected and still in supported range.
AI Analysis
Technical Summary
CVE-2022-41883 is a medium-severity vulnerability classified as CWE-125 (Out-of-bounds Read) affecting TensorFlow, an open-source machine learning platform widely used for developing and deploying ML models. The issue arises when TensorFlow operations (ops) that expect a specific number of inputs receive a differing number of inputs. This mismatch causes the TensorFlow executor to perform an out-of-bounds read, leading to a crash of the executor process. The vulnerability affects TensorFlow versions starting from 2.10.0 up to but not including 2.10.1, as well as earlier supported versions 2.9.3 and 2.8.4, which have been patched via cherry-picked commits. The root cause is improper input validation in the executor component, which does not correctly handle the discrepancy between expected and actual input sizes for certain ops. While this vulnerability does not appear to allow arbitrary code execution or direct data leakage, the out-of-bounds read can cause denial of service (DoS) by crashing the TensorFlow process, potentially disrupting ML workflows or services relying on TensorFlow. No known exploits are reported in the wild, and the fix has been integrated into TensorFlow 2.11 and backported to affected supported versions. The vulnerability requires no authentication or user interaction beyond supplying malformed inputs to TensorFlow operations, which could be triggered by an attacker with the ability to influence input data to TensorFlow models or pipelines.
Potential Impact
For European organizations leveraging TensorFlow in production environments—such as research institutions, AI-driven enterprises, and cloud service providers—the primary impact is the risk of denial of service due to executor crashes. This can disrupt critical machine learning workloads, delay data processing, and degrade service availability. Organizations deploying TensorFlow in multi-tenant or cloud environments may face increased risk if attackers can supply crafted inputs remotely, potentially causing service outages. While the vulnerability does not directly compromise confidentiality or integrity, the availability impact can affect business continuity, especially in sectors relying heavily on AI for decision-making, automation, or customer-facing applications. Additionally, organizations with automated ML pipelines may experience cascading failures or require manual intervention to recover from crashes. Given the widespread adoption of TensorFlow across industries in Europe, the disruption potential is significant, particularly for sectors such as finance, healthcare, automotive, and telecommunications, where AI workloads are integral.
Mitigation Recommendations
To mitigate this vulnerability, European organizations should promptly upgrade TensorFlow to version 2.11 or apply the relevant patches to supported versions 2.10.1, 2.9.3, or 2.8.4. It is critical to audit ML pipelines and applications to identify any components that accept external or untrusted input data feeding into TensorFlow ops, implementing input validation and sanitization to prevent malformed inputs that could trigger the out-of-bounds read. Organizations should also implement robust monitoring and alerting on TensorFlow process health to detect crashes early and enable rapid recovery. Employing containerization or sandboxing for TensorFlow workloads can limit the blast radius of crashes. For cloud deployments, leveraging managed ML services with vendor-provided patches can reduce exposure. Finally, conducting thorough regression testing after patching ensures that ML models and workflows continue to function correctly without unintended side effects.
Affected Countries
Germany, France, United Kingdom, Netherlands, Sweden, Finland, Italy, Spain, Poland, Belgium
CVE-2022-41883: CWE-125: Out-of-bounds Read in tensorflow tensorflow
Description
TensorFlow is an open source platform for machine learning. When ops that have specified input sizes receive a differing number of inputs, the executor will crash. We have patched the issue in GitHub commit f5381e0e10b5a61344109c1b7c174c68110f7629. The fix will be included in TensorFlow 2.11. We will also cherrypick this commit on TensorFlow 2.10.1, 2.9.3, and TensorFlow 2.8.4, as these are also affected and still in supported range.
AI-Powered Analysis
Technical Analysis
CVE-2022-41883 is a medium-severity vulnerability classified as CWE-125 (Out-of-bounds Read) affecting TensorFlow, an open-source machine learning platform widely used for developing and deploying ML models. The issue arises when TensorFlow operations (ops) that expect a specific number of inputs receive a differing number of inputs. This mismatch causes the TensorFlow executor to perform an out-of-bounds read, leading to a crash of the executor process. The vulnerability affects TensorFlow versions starting from 2.10.0 up to but not including 2.10.1, as well as earlier supported versions 2.9.3 and 2.8.4, which have been patched via cherry-picked commits. The root cause is improper input validation in the executor component, which does not correctly handle the discrepancy between expected and actual input sizes for certain ops. While this vulnerability does not appear to allow arbitrary code execution or direct data leakage, the out-of-bounds read can cause denial of service (DoS) by crashing the TensorFlow process, potentially disrupting ML workflows or services relying on TensorFlow. No known exploits are reported in the wild, and the fix has been integrated into TensorFlow 2.11 and backported to affected supported versions. The vulnerability requires no authentication or user interaction beyond supplying malformed inputs to TensorFlow operations, which could be triggered by an attacker with the ability to influence input data to TensorFlow models or pipelines.
Potential Impact
For European organizations leveraging TensorFlow in production environments—such as research institutions, AI-driven enterprises, and cloud service providers—the primary impact is the risk of denial of service due to executor crashes. This can disrupt critical machine learning workloads, delay data processing, and degrade service availability. Organizations deploying TensorFlow in multi-tenant or cloud environments may face increased risk if attackers can supply crafted inputs remotely, potentially causing service outages. While the vulnerability does not directly compromise confidentiality or integrity, the availability impact can affect business continuity, especially in sectors relying heavily on AI for decision-making, automation, or customer-facing applications. Additionally, organizations with automated ML pipelines may experience cascading failures or require manual intervention to recover from crashes. Given the widespread adoption of TensorFlow across industries in Europe, the disruption potential is significant, particularly for sectors such as finance, healthcare, automotive, and telecommunications, where AI workloads are integral.
Mitigation Recommendations
To mitigate this vulnerability, European organizations should promptly upgrade TensorFlow to version 2.11 or apply the relevant patches to supported versions 2.10.1, 2.9.3, or 2.8.4. It is critical to audit ML pipelines and applications to identify any components that accept external or untrusted input data feeding into TensorFlow ops, implementing input validation and sanitization to prevent malformed inputs that could trigger the out-of-bounds read. Organizations should also implement robust monitoring and alerting on TensorFlow process health to detect crashes early and enable rapid recovery. Employing containerization or sandboxing for TensorFlow workloads can limit the blast radius of crashes. For cloud deployments, leveraging managed ML services with vendor-provided patches can reduce exposure. Finally, conducting thorough regression testing after patching ensures that ML models and workflows continue to function correctly without unintended side effects.
Technical Details
- Data Version
- 5.1
- Assigner Short Name
- GitHub_M
- Date Reserved
- 2022-09-30T00:00:00.000Z
- Cisa Enriched
- true
Threat ID: 682d9849c4522896dcbf6c96
Added to database: 5/21/2025, 9:09:29 AM
Last enriched: 6/21/2025, 9:23:01 PM
Last updated: 2/7/2026, 9:16:47 AM
Views: 90
Community Reviews
0 reviewsCrowdsource mitigation strategies, share intel context, and vote on the most helpful responses. Sign in to add your voice and help keep defenders ahead.
Want to contribute mitigation steps or threat intel context? Sign in or create an account to join the community discussion.
Related Threats
CVE-2026-2080: Command Injection in UTT HiPER 810
HighCVE-2026-2079: Improper Authorization in yeqifu warehouse
MediumCVE-2026-1675: CWE-1188 Initialization of a Resource with an Insecure Default in brstefanovic Advanced Country Blocker
MediumCVE-2026-1643: CWE-79 Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting') in ariagle MP-Ukagaka
MediumCVE-2026-1634: CWE-79 Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting') in alexdtn Subitem AL Slider
MediumActions
Updates to AI analysis require Pro Console access. Upgrade inside Console → Billing.
External Links
Need more coverage?
Upgrade to Pro Console in Console -> Billing for AI refresh and higher limits.
For incident response and remediation, OffSeq services can help resolve threats faster.