Skip to main content

CVE-2022-41893: CWE-617: Reachable Assertion in tensorflow tensorflow

Medium
Published: Fri Nov 18 2022 (11/18/2022, 00:00:00 UTC)
Source: CVE
Vendor/Project: tensorflow
Product: tensorflow

Description

TensorFlow is an open source platform for machine learning. If `tf.raw_ops.TensorListResize` is given a nonscalar value for input `size`, it results `CHECK` fail which can be used to trigger a denial of service attack. We have patched the issue in GitHub commit 888e34b49009a4e734c27ab0c43b0b5102682c56. The fix will be included in TensorFlow 2.11. We will also cherrypick this commit on TensorFlow 2.10.1, 2.9.3, and TensorFlow 2.8.4, as these are also affected and still in supported range.

AI-Powered Analysis

AILast updated: 06/21/2025, 21:08:40 UTC

Technical Analysis

CVE-2022-41893 is a medium-severity vulnerability identified in TensorFlow, an open-source machine learning platform widely used for developing and deploying machine learning models. The vulnerability arises from a reachable assertion failure (CWE-617) within the TensorFlow operation `tf.raw_ops.TensorListResize`. Specifically, when this operation receives a nonscalar value for its `size` input parameter, it triggers a `CHECK` failure, causing the program to terminate unexpectedly. This behavior can be exploited to cause a denial of service (DoS) condition by crashing applications that rely on the affected TensorFlow versions. The affected versions include TensorFlow releases from 2.8.4 and earlier, as well as versions 2.9.0 up to but not including 2.9.3, and 2.10.0 up to but not including 2.10.1. The issue has been addressed in a GitHub commit (888e34b49009a4e734c27ab0c43b0b5102682c56) and will be included in TensorFlow 2.11, with backported fixes planned for 2.10.1, 2.9.3, and 2.8.4. No known exploits have been reported in the wild to date. The vulnerability does not require authentication or user interaction to be triggered, but exploitation requires the ability to supply crafted inputs to the TensorFlow API, which typically implies some level of access to the machine learning environment or application using TensorFlow. The impact is primarily a denial of service through application crashes rather than data compromise or code execution.

Potential Impact

For European organizations, the primary impact of this vulnerability is the potential disruption of machine learning services and applications that utilize affected TensorFlow versions. This could affect sectors heavily reliant on AI and ML, such as finance, healthcare, automotive, and manufacturing, where TensorFlow is used for predictive analytics, diagnostics, autonomous systems, and process optimization. A denial of service could lead to downtime, loss of productivity, and potential financial losses. While the vulnerability does not directly compromise confidentiality or integrity, service unavailability could indirectly affect business operations and trust. Organizations running TensorFlow in production environments, especially those exposing TensorFlow APIs or services to internal or external users, are at higher risk. Given the widespread adoption of TensorFlow in research institutions and enterprises across Europe, the scope of affected systems is significant. However, the lack of known exploits and the requirement to supply specific malformed inputs somewhat limit the immediate risk.

Mitigation Recommendations

1. Upgrade TensorFlow to version 2.11 or later, or apply the backported patches available for versions 2.10.1, 2.9.3, and 2.8.4 as soon as possible to eliminate the vulnerability. 2. Review and restrict access to TensorFlow APIs and services to trusted users and systems only, minimizing the risk of malicious input injection. 3. Implement input validation and sanitization at the application layer to prevent nonscalar values from being passed to `tf.raw_ops.TensorListResize` or similar operations. 4. Monitor application logs and system behavior for unexpected crashes or assertion failures that may indicate attempted exploitation. 5. For organizations using containerized or cloud-based TensorFlow deployments, ensure that images and environments are updated promptly and that runtime security controls are in place to detect anomalous behavior. 6. Conduct security awareness and training for developers and data scientists to understand the importance of secure input handling in machine learning workflows. 7. Establish incident response procedures to quickly address and recover from potential denial of service events related to this vulnerability.

Need more detailed analysis?Get Pro

Technical Details

Data Version
5.1
Assigner Short Name
GitHub_M
Date Reserved
2022-09-30T00:00:00.000Z
Cisa Enriched
true

Threat ID: 682d9849c4522896dcbf6ccb

Added to database: 5/21/2025, 9:09:29 AM

Last enriched: 6/21/2025, 9:08:40 PM

Last updated: 8/12/2025, 7:44:55 PM

Views: 10

Actions

PRO

Updates to AI analysis are available only with a Pro account. Contact root@offseq.com for access.

Please log in to the Console to use AI analysis features.

Need enhanced features?

Contact root@offseq.com for Pro access with improved analysis and higher rate limits.

Latest Threats