CVE-2022-41893: CWE-617: Reachable Assertion in tensorflow tensorflow
TensorFlow is an open source platform for machine learning. If `tf.raw_ops.TensorListResize` is given a nonscalar value for input `size`, it results `CHECK` fail which can be used to trigger a denial of service attack. We have patched the issue in GitHub commit 888e34b49009a4e734c27ab0c43b0b5102682c56. The fix will be included in TensorFlow 2.11. We will also cherrypick this commit on TensorFlow 2.10.1, 2.9.3, and TensorFlow 2.8.4, as these are also affected and still in supported range.
AI Analysis
Technical Summary
CVE-2022-41893 is a medium-severity vulnerability identified in TensorFlow, an open-source machine learning platform widely used for developing and deploying machine learning models. The vulnerability arises from a reachable assertion failure (CWE-617) within the TensorFlow operation `tf.raw_ops.TensorListResize`. Specifically, when this operation receives a nonscalar value for its `size` input parameter, it triggers a `CHECK` failure, causing the program to terminate unexpectedly. This behavior can be exploited to cause a denial of service (DoS) condition by crashing applications that rely on the affected TensorFlow versions. The affected versions include TensorFlow releases from 2.8.4 and earlier, as well as versions 2.9.0 up to but not including 2.9.3, and 2.10.0 up to but not including 2.10.1. The issue has been addressed in a GitHub commit (888e34b49009a4e734c27ab0c43b0b5102682c56) and will be included in TensorFlow 2.11, with backported fixes planned for 2.10.1, 2.9.3, and 2.8.4. No known exploits have been reported in the wild to date. The vulnerability does not require authentication or user interaction to be triggered, but exploitation requires the ability to supply crafted inputs to the TensorFlow API, which typically implies some level of access to the machine learning environment or application using TensorFlow. The impact is primarily a denial of service through application crashes rather than data compromise or code execution.
Potential Impact
For European organizations, the primary impact of this vulnerability is the potential disruption of machine learning services and applications that utilize affected TensorFlow versions. This could affect sectors heavily reliant on AI and ML, such as finance, healthcare, automotive, and manufacturing, where TensorFlow is used for predictive analytics, diagnostics, autonomous systems, and process optimization. A denial of service could lead to downtime, loss of productivity, and potential financial losses. While the vulnerability does not directly compromise confidentiality or integrity, service unavailability could indirectly affect business operations and trust. Organizations running TensorFlow in production environments, especially those exposing TensorFlow APIs or services to internal or external users, are at higher risk. Given the widespread adoption of TensorFlow in research institutions and enterprises across Europe, the scope of affected systems is significant. However, the lack of known exploits and the requirement to supply specific malformed inputs somewhat limit the immediate risk.
Mitigation Recommendations
1. Upgrade TensorFlow to version 2.11 or later, or apply the backported patches available for versions 2.10.1, 2.9.3, and 2.8.4 as soon as possible to eliminate the vulnerability. 2. Review and restrict access to TensorFlow APIs and services to trusted users and systems only, minimizing the risk of malicious input injection. 3. Implement input validation and sanitization at the application layer to prevent nonscalar values from being passed to `tf.raw_ops.TensorListResize` or similar operations. 4. Monitor application logs and system behavior for unexpected crashes or assertion failures that may indicate attempted exploitation. 5. For organizations using containerized or cloud-based TensorFlow deployments, ensure that images and environments are updated promptly and that runtime security controls are in place to detect anomalous behavior. 6. Conduct security awareness and training for developers and data scientists to understand the importance of secure input handling in machine learning workflows. 7. Establish incident response procedures to quickly address and recover from potential denial of service events related to this vulnerability.
Affected Countries
Germany, France, United Kingdom, Netherlands, Sweden, Finland, Italy, Spain, Belgium, Poland
CVE-2022-41893: CWE-617: Reachable Assertion in tensorflow tensorflow
Description
TensorFlow is an open source platform for machine learning. If `tf.raw_ops.TensorListResize` is given a nonscalar value for input `size`, it results `CHECK` fail which can be used to trigger a denial of service attack. We have patched the issue in GitHub commit 888e34b49009a4e734c27ab0c43b0b5102682c56. The fix will be included in TensorFlow 2.11. We will also cherrypick this commit on TensorFlow 2.10.1, 2.9.3, and TensorFlow 2.8.4, as these are also affected and still in supported range.
AI-Powered Analysis
Technical Analysis
CVE-2022-41893 is a medium-severity vulnerability identified in TensorFlow, an open-source machine learning platform widely used for developing and deploying machine learning models. The vulnerability arises from a reachable assertion failure (CWE-617) within the TensorFlow operation `tf.raw_ops.TensorListResize`. Specifically, when this operation receives a nonscalar value for its `size` input parameter, it triggers a `CHECK` failure, causing the program to terminate unexpectedly. This behavior can be exploited to cause a denial of service (DoS) condition by crashing applications that rely on the affected TensorFlow versions. The affected versions include TensorFlow releases from 2.8.4 and earlier, as well as versions 2.9.0 up to but not including 2.9.3, and 2.10.0 up to but not including 2.10.1. The issue has been addressed in a GitHub commit (888e34b49009a4e734c27ab0c43b0b5102682c56) and will be included in TensorFlow 2.11, with backported fixes planned for 2.10.1, 2.9.3, and 2.8.4. No known exploits have been reported in the wild to date. The vulnerability does not require authentication or user interaction to be triggered, but exploitation requires the ability to supply crafted inputs to the TensorFlow API, which typically implies some level of access to the machine learning environment or application using TensorFlow. The impact is primarily a denial of service through application crashes rather than data compromise or code execution.
Potential Impact
For European organizations, the primary impact of this vulnerability is the potential disruption of machine learning services and applications that utilize affected TensorFlow versions. This could affect sectors heavily reliant on AI and ML, such as finance, healthcare, automotive, and manufacturing, where TensorFlow is used for predictive analytics, diagnostics, autonomous systems, and process optimization. A denial of service could lead to downtime, loss of productivity, and potential financial losses. While the vulnerability does not directly compromise confidentiality or integrity, service unavailability could indirectly affect business operations and trust. Organizations running TensorFlow in production environments, especially those exposing TensorFlow APIs or services to internal or external users, are at higher risk. Given the widespread adoption of TensorFlow in research institutions and enterprises across Europe, the scope of affected systems is significant. However, the lack of known exploits and the requirement to supply specific malformed inputs somewhat limit the immediate risk.
Mitigation Recommendations
1. Upgrade TensorFlow to version 2.11 or later, or apply the backported patches available for versions 2.10.1, 2.9.3, and 2.8.4 as soon as possible to eliminate the vulnerability. 2. Review and restrict access to TensorFlow APIs and services to trusted users and systems only, minimizing the risk of malicious input injection. 3. Implement input validation and sanitization at the application layer to prevent nonscalar values from being passed to `tf.raw_ops.TensorListResize` or similar operations. 4. Monitor application logs and system behavior for unexpected crashes or assertion failures that may indicate attempted exploitation. 5. For organizations using containerized or cloud-based TensorFlow deployments, ensure that images and environments are updated promptly and that runtime security controls are in place to detect anomalous behavior. 6. Conduct security awareness and training for developers and data scientists to understand the importance of secure input handling in machine learning workflows. 7. Establish incident response procedures to quickly address and recover from potential denial of service events related to this vulnerability.
For access to advanced analysis and higher rate limits, contact root@offseq.com
Technical Details
- Data Version
- 5.1
- Assigner Short Name
- GitHub_M
- Date Reserved
- 2022-09-30T00:00:00.000Z
- Cisa Enriched
- true
Threat ID: 682d9849c4522896dcbf6ccb
Added to database: 5/21/2025, 9:09:29 AM
Last enriched: 6/21/2025, 9:08:40 PM
Last updated: 8/12/2025, 7:44:55 PM
Views: 10
Related Threats
CVE-2025-53948: CWE-415 Double Free in Santesoft Sante PACS Server
HighCVE-2025-52584: CWE-122 Heap-based Buffer Overflow in Ashlar-Vellum Cobalt
HighCVE-2025-46269: CWE-122 Heap-based Buffer Overflow in Ashlar-Vellum Cobalt
HighCVE-2025-54862: CWE-79 Improper Neutralization of Input During Web Page Generation (XSS or 'Cross-site Scripting') in Santesoft Sante PACS Server
MediumCVE-2025-54759: CWE-79 Improper Neutralization of Input During Web Page Generation (XSS or 'Cross-site Scripting') in Santesoft Sante PACS Server
MediumActions
Updates to AI analysis are available only with a Pro account. Contact root@offseq.com for access.
External Links
Need enhanced features?
Contact root@offseq.com for Pro access with improved analysis and higher rate limits.