CVE-2022-41893: CWE-617: Reachable Assertion in tensorflow tensorflow
TensorFlow is an open source platform for machine learning. If `tf.raw_ops.TensorListResize` is given a nonscalar value for input `size`, it results `CHECK` fail which can be used to trigger a denial of service attack. We have patched the issue in GitHub commit 888e34b49009a4e734c27ab0c43b0b5102682c56. The fix will be included in TensorFlow 2.11. We will also cherrypick this commit on TensorFlow 2.10.1, 2.9.3, and TensorFlow 2.8.4, as these are also affected and still in supported range.
AI Analysis
Technical Summary
CVE-2022-41893 is a medium-severity vulnerability identified in TensorFlow, an open-source machine learning platform widely used for developing and deploying machine learning models. The vulnerability arises from a reachable assertion failure (CWE-617) within the TensorFlow operation `tf.raw_ops.TensorListResize`. Specifically, when this operation receives a nonscalar value for its `size` input parameter, it triggers a `CHECK` failure, causing the program to terminate unexpectedly. This behavior can be exploited to cause a denial of service (DoS) condition by crashing applications that rely on the affected TensorFlow versions. The affected versions include TensorFlow releases from 2.8.4 and earlier, as well as versions 2.9.0 up to but not including 2.9.3, and 2.10.0 up to but not including 2.10.1. The issue has been addressed in a GitHub commit (888e34b49009a4e734c27ab0c43b0b5102682c56) and will be included in TensorFlow 2.11, with backported fixes planned for 2.10.1, 2.9.3, and 2.8.4. No known exploits have been reported in the wild to date. The vulnerability does not require authentication or user interaction to be triggered, but exploitation requires the ability to supply crafted inputs to the TensorFlow API, which typically implies some level of access to the machine learning environment or application using TensorFlow. The impact is primarily a denial of service through application crashes rather than data compromise or code execution.
Potential Impact
For European organizations, the primary impact of this vulnerability is the potential disruption of machine learning services and applications that utilize affected TensorFlow versions. This could affect sectors heavily reliant on AI and ML, such as finance, healthcare, automotive, and manufacturing, where TensorFlow is used for predictive analytics, diagnostics, autonomous systems, and process optimization. A denial of service could lead to downtime, loss of productivity, and potential financial losses. While the vulnerability does not directly compromise confidentiality or integrity, service unavailability could indirectly affect business operations and trust. Organizations running TensorFlow in production environments, especially those exposing TensorFlow APIs or services to internal or external users, are at higher risk. Given the widespread adoption of TensorFlow in research institutions and enterprises across Europe, the scope of affected systems is significant. However, the lack of known exploits and the requirement to supply specific malformed inputs somewhat limit the immediate risk.
Mitigation Recommendations
1. Upgrade TensorFlow to version 2.11 or later, or apply the backported patches available for versions 2.10.1, 2.9.3, and 2.8.4 as soon as possible to eliminate the vulnerability. 2. Review and restrict access to TensorFlow APIs and services to trusted users and systems only, minimizing the risk of malicious input injection. 3. Implement input validation and sanitization at the application layer to prevent nonscalar values from being passed to `tf.raw_ops.TensorListResize` or similar operations. 4. Monitor application logs and system behavior for unexpected crashes or assertion failures that may indicate attempted exploitation. 5. For organizations using containerized or cloud-based TensorFlow deployments, ensure that images and environments are updated promptly and that runtime security controls are in place to detect anomalous behavior. 6. Conduct security awareness and training for developers and data scientists to understand the importance of secure input handling in machine learning workflows. 7. Establish incident response procedures to quickly address and recover from potential denial of service events related to this vulnerability.
Affected Countries
Germany, France, United Kingdom, Netherlands, Sweden, Finland, Italy, Spain, Belgium, Poland
CVE-2022-41893: CWE-617: Reachable Assertion in tensorflow tensorflow
Description
TensorFlow is an open source platform for machine learning. If `tf.raw_ops.TensorListResize` is given a nonscalar value for input `size`, it results `CHECK` fail which can be used to trigger a denial of service attack. We have patched the issue in GitHub commit 888e34b49009a4e734c27ab0c43b0b5102682c56. The fix will be included in TensorFlow 2.11. We will also cherrypick this commit on TensorFlow 2.10.1, 2.9.3, and TensorFlow 2.8.4, as these are also affected and still in supported range.
AI-Powered Analysis
Technical Analysis
CVE-2022-41893 is a medium-severity vulnerability identified in TensorFlow, an open-source machine learning platform widely used for developing and deploying machine learning models. The vulnerability arises from a reachable assertion failure (CWE-617) within the TensorFlow operation `tf.raw_ops.TensorListResize`. Specifically, when this operation receives a nonscalar value for its `size` input parameter, it triggers a `CHECK` failure, causing the program to terminate unexpectedly. This behavior can be exploited to cause a denial of service (DoS) condition by crashing applications that rely on the affected TensorFlow versions. The affected versions include TensorFlow releases from 2.8.4 and earlier, as well as versions 2.9.0 up to but not including 2.9.3, and 2.10.0 up to but not including 2.10.1. The issue has been addressed in a GitHub commit (888e34b49009a4e734c27ab0c43b0b5102682c56) and will be included in TensorFlow 2.11, with backported fixes planned for 2.10.1, 2.9.3, and 2.8.4. No known exploits have been reported in the wild to date. The vulnerability does not require authentication or user interaction to be triggered, but exploitation requires the ability to supply crafted inputs to the TensorFlow API, which typically implies some level of access to the machine learning environment or application using TensorFlow. The impact is primarily a denial of service through application crashes rather than data compromise or code execution.
Potential Impact
For European organizations, the primary impact of this vulnerability is the potential disruption of machine learning services and applications that utilize affected TensorFlow versions. This could affect sectors heavily reliant on AI and ML, such as finance, healthcare, automotive, and manufacturing, where TensorFlow is used for predictive analytics, diagnostics, autonomous systems, and process optimization. A denial of service could lead to downtime, loss of productivity, and potential financial losses. While the vulnerability does not directly compromise confidentiality or integrity, service unavailability could indirectly affect business operations and trust. Organizations running TensorFlow in production environments, especially those exposing TensorFlow APIs or services to internal or external users, are at higher risk. Given the widespread adoption of TensorFlow in research institutions and enterprises across Europe, the scope of affected systems is significant. However, the lack of known exploits and the requirement to supply specific malformed inputs somewhat limit the immediate risk.
Mitigation Recommendations
1. Upgrade TensorFlow to version 2.11 or later, or apply the backported patches available for versions 2.10.1, 2.9.3, and 2.8.4 as soon as possible to eliminate the vulnerability. 2. Review and restrict access to TensorFlow APIs and services to trusted users and systems only, minimizing the risk of malicious input injection. 3. Implement input validation and sanitization at the application layer to prevent nonscalar values from being passed to `tf.raw_ops.TensorListResize` or similar operations. 4. Monitor application logs and system behavior for unexpected crashes or assertion failures that may indicate attempted exploitation. 5. For organizations using containerized or cloud-based TensorFlow deployments, ensure that images and environments are updated promptly and that runtime security controls are in place to detect anomalous behavior. 6. Conduct security awareness and training for developers and data scientists to understand the importance of secure input handling in machine learning workflows. 7. Establish incident response procedures to quickly address and recover from potential denial of service events related to this vulnerability.
For access to advanced analysis and higher rate limits, contact root@offseq.com
Technical Details
- Data Version
- 5.1
- Assigner Short Name
- GitHub_M
- Date Reserved
- 2022-09-30T00:00:00.000Z
- Cisa Enriched
- true
Threat ID: 682d9849c4522896dcbf6ccb
Added to database: 5/21/2025, 9:09:29 AM
Last enriched: 6/21/2025, 9:08:40 PM
Last updated: 10/15/2025, 11:37:06 PM
Views: 23
Community Reviews
0 reviewsCrowdsource mitigation strategies, share intel context, and vote on the most helpful responses. Sign in to add your voice and help keep defenders ahead.
Want to contribute mitigation steps or threat intel context? Sign in or create an account to join the community discussion.
Related Threats
CVE-2025-11619: CWE-295 Improper Certificate Validation in Devolutions Devolutions Server
HighCVE-2025-43313: An app may be able to access sensitive user data in Apple macOS
MediumCVE-2025-43282: An app may be able to cause unexpected system termination in Apple iPadOS
MediumCVE-2025-43281: A local attacker may be able to elevate their privileges in Apple macOS
UnknownCVE-2025-43280: Forwarding an email could display remote images in Mail in Lockdown Mode in Apple iOS and iPadOS
UnknownActions
Updates to AI analysis require Pro Console access. Upgrade inside Console → Billing.
External Links
Need enhanced features?
Contact root@offseq.com for Pro access with improved analysis and higher rate limits.