CVE-2022-41891: CWE-20: Improper Input Validation in tensorflow tensorflow
TensorFlow is an open source platform for machine learning. If `tf.raw_ops.TensorListConcat` is given `element_shape=[]`, it results segmentation fault which can be used to trigger a denial of service attack. We have patched the issue in GitHub commit fc33f3dc4c14051a83eec6535b608abe1d355fde. The fix will be included in TensorFlow 2.11. We will also cherrypick this commit on TensorFlow 2.10.1, 2.9.3, and TensorFlow 2.8.4, as these are also affected and still in supported range.
AI Analysis
Technical Summary
CVE-2022-41891 is a medium severity vulnerability in TensorFlow, an open-source machine learning platform widely used for developing and deploying machine learning models. The vulnerability arises from improper input validation (CWE-20) in the TensorFlow raw operation `tf.raw_ops.TensorListConcat`. Specifically, when the parameter `element_shape` is provided as an empty list (`[]`), it triggers a segmentation fault, causing the TensorFlow process to crash. This behavior can be exploited by an attacker to cause a denial of service (DoS) condition by forcing the application or service using TensorFlow to terminate unexpectedly. The issue affects multiple TensorFlow versions: all versions starting from 2.8.0 up to but not including 2.8.4, versions from 2.9.0 up to but not including 2.9.3, and versions from 2.10.0 up to but not including 2.10.1. The vulnerability has been patched in TensorFlow 2.11 and backported to 2.10.1, 2.9.3, and 2.8.4. No known exploits have been reported in the wild to date. The root cause is a lack of proper validation on the input parameter, which leads to unsafe memory access and a segmentation fault. Since the vulnerability requires the attacker to supply crafted input to the TensorFlow API, exploitation typically requires the attacker to have some level of access to the environment where TensorFlow is running, such as the ability to submit or influence model inputs or data processing pipelines. This vulnerability does not directly lead to code execution or data leakage but can disrupt availability by crashing the service.
Potential Impact
For European organizations, the impact of this vulnerability primarily concerns availability disruptions in machine learning services and applications that rely on affected TensorFlow versions. Organizations using TensorFlow in production environments for critical applications—such as financial institutions employing AI for fraud detection, healthcare providers using AI for diagnostics, or manufacturing firms leveraging AI for predictive maintenance—may experience service outages if the vulnerability is exploited. Although the vulnerability does not compromise confidentiality or integrity directly, denial of service attacks can degrade trust, interrupt business operations, and cause financial losses. Additionally, organizations that expose TensorFlow-based services to external users or partners may be at higher risk if attackers can supply malicious inputs remotely. Since TensorFlow is widely used in research and development across Europe, disruption in AI workflows could delay innovation and operational efficiency. The absence of known exploits reduces immediate risk, but the vulnerability remains a concern until patched, especially in environments where TensorFlow is integrated into automated pipelines or exposed to untrusted inputs.
Mitigation Recommendations
1. Upgrade TensorFlow to version 2.11 or later, or apply the backported patches available in versions 2.10.1, 2.9.3, and 2.8.4 to ensure the vulnerability is fixed. 2. Implement input validation and sanitization at the application layer before passing data to TensorFlow APIs, specifically ensuring that `element_shape` parameters are validated to prevent empty lists or malformed inputs. 3. Restrict access to TensorFlow services and APIs to trusted users and systems only, minimizing the risk of malicious input injection. 4. Monitor TensorFlow application logs and system crash reports for signs of segmentation faults or unexpected terminations that could indicate attempted exploitation. 5. Employ runtime protections such as containerization or sandboxing to isolate TensorFlow processes, limiting the impact of crashes on broader systems. 6. For organizations exposing TensorFlow-powered services externally, implement rate limiting and input anomaly detection to detect and block suspicious requests that may trigger the vulnerability. 7. Conduct regular security reviews and update dependency management processes to ensure timely application of patches for TensorFlow and other critical libraries.
Affected Countries
Germany, France, United Kingdom, Netherlands, Sweden, Finland, Italy, Spain, Poland
CVE-2022-41891: CWE-20: Improper Input Validation in tensorflow tensorflow
Description
TensorFlow is an open source platform for machine learning. If `tf.raw_ops.TensorListConcat` is given `element_shape=[]`, it results segmentation fault which can be used to trigger a denial of service attack. We have patched the issue in GitHub commit fc33f3dc4c14051a83eec6535b608abe1d355fde. The fix will be included in TensorFlow 2.11. We will also cherrypick this commit on TensorFlow 2.10.1, 2.9.3, and TensorFlow 2.8.4, as these are also affected and still in supported range.
AI-Powered Analysis
Technical Analysis
CVE-2022-41891 is a medium severity vulnerability in TensorFlow, an open-source machine learning platform widely used for developing and deploying machine learning models. The vulnerability arises from improper input validation (CWE-20) in the TensorFlow raw operation `tf.raw_ops.TensorListConcat`. Specifically, when the parameter `element_shape` is provided as an empty list (`[]`), it triggers a segmentation fault, causing the TensorFlow process to crash. This behavior can be exploited by an attacker to cause a denial of service (DoS) condition by forcing the application or service using TensorFlow to terminate unexpectedly. The issue affects multiple TensorFlow versions: all versions starting from 2.8.0 up to but not including 2.8.4, versions from 2.9.0 up to but not including 2.9.3, and versions from 2.10.0 up to but not including 2.10.1. The vulnerability has been patched in TensorFlow 2.11 and backported to 2.10.1, 2.9.3, and 2.8.4. No known exploits have been reported in the wild to date. The root cause is a lack of proper validation on the input parameter, which leads to unsafe memory access and a segmentation fault. Since the vulnerability requires the attacker to supply crafted input to the TensorFlow API, exploitation typically requires the attacker to have some level of access to the environment where TensorFlow is running, such as the ability to submit or influence model inputs or data processing pipelines. This vulnerability does not directly lead to code execution or data leakage but can disrupt availability by crashing the service.
Potential Impact
For European organizations, the impact of this vulnerability primarily concerns availability disruptions in machine learning services and applications that rely on affected TensorFlow versions. Organizations using TensorFlow in production environments for critical applications—such as financial institutions employing AI for fraud detection, healthcare providers using AI for diagnostics, or manufacturing firms leveraging AI for predictive maintenance—may experience service outages if the vulnerability is exploited. Although the vulnerability does not compromise confidentiality or integrity directly, denial of service attacks can degrade trust, interrupt business operations, and cause financial losses. Additionally, organizations that expose TensorFlow-based services to external users or partners may be at higher risk if attackers can supply malicious inputs remotely. Since TensorFlow is widely used in research and development across Europe, disruption in AI workflows could delay innovation and operational efficiency. The absence of known exploits reduces immediate risk, but the vulnerability remains a concern until patched, especially in environments where TensorFlow is integrated into automated pipelines or exposed to untrusted inputs.
Mitigation Recommendations
1. Upgrade TensorFlow to version 2.11 or later, or apply the backported patches available in versions 2.10.1, 2.9.3, and 2.8.4 to ensure the vulnerability is fixed. 2. Implement input validation and sanitization at the application layer before passing data to TensorFlow APIs, specifically ensuring that `element_shape` parameters are validated to prevent empty lists or malformed inputs. 3. Restrict access to TensorFlow services and APIs to trusted users and systems only, minimizing the risk of malicious input injection. 4. Monitor TensorFlow application logs and system crash reports for signs of segmentation faults or unexpected terminations that could indicate attempted exploitation. 5. Employ runtime protections such as containerization or sandboxing to isolate TensorFlow processes, limiting the impact of crashes on broader systems. 6. For organizations exposing TensorFlow-powered services externally, implement rate limiting and input anomaly detection to detect and block suspicious requests that may trigger the vulnerability. 7. Conduct regular security reviews and update dependency management processes to ensure timely application of patches for TensorFlow and other critical libraries.
Affected Countries
Technical Details
- Data Version
- 5.1
- Assigner Short Name
- GitHub_M
- Date Reserved
- 2022-09-30T00:00:00.000Z
- Cisa Enriched
- true
Threat ID: 682d9849c4522896dcbf6cc7
Added to database: 5/21/2025, 9:09:29 AM
Last enriched: 6/21/2025, 9:08:52 PM
Last updated: 2/7/2026, 10:07:26 PM
Views: 41
Community Reviews
0 reviewsCrowdsource mitigation strategies, share intel context, and vote on the most helpful responses. Sign in to add your voice and help keep defenders ahead.
Want to contribute mitigation steps or threat intel context? Sign in or create an account to join the community discussion.
Related Threats
CVE-2026-25858: CWE-640 Weak Password Recovery Mechanism for Forgotten Password in macrozheng mall
CriticalCVE-2026-25857: CWE-78 Improper Neutralization of Special Elements used in an OS Command ('OS Command Injection') in Shenzhen Tenda Technology Tenda G300-F
HighCVE-2025-15564: Divide By Zero in Mapnik
MediumCVE-2026-2113: Deserialization in yuan1994 tpadmin
MediumCVE-2026-2111: Path Traversal in JeecgBoot
MediumActions
Updates to AI analysis require Pro Console access. Upgrade inside Console → Billing.
External Links
Need more coverage?
Upgrade to Pro Console in Console -> Billing for AI refresh and higher limits.
For incident response and remediation, OffSeq services can help resolve threats faster.