Skip to main content

CVE-2022-41895: CWE-125: Out-of-bounds Read in tensorflow tensorflow

Medium
Published: Fri Nov 18 2022 (11/18/2022, 00:00:00 UTC)
Source: CVE
Vendor/Project: tensorflow
Product: tensorflow

Description

TensorFlow is an open source platform for machine learning. If `MirrorPadGrad` is given outsize input `paddings`, TensorFlow will give a heap OOB error. We have patched the issue in GitHub commit 717ca98d8c3bba348ff62281fdf38dcb5ea1ec92. The fix will be included in TensorFlow 2.11. We will also cherrypick this commit on TensorFlow 2.10.1, 2.9.3, and TensorFlow 2.8.4, as these are also affected and still in supported range.

AI-Powered Analysis

AILast updated: 06/21/2025, 21:08:13 UTC

Technical Analysis

CVE-2022-41895 is a medium-severity vulnerability identified in TensorFlow, an open-source machine learning platform widely used for developing and deploying machine learning models. The vulnerability is classified as CWE-125, an out-of-bounds (OOB) read, which occurs when the TensorFlow operation `MirrorPadGrad` is provided with input paddings that exceed expected bounds. This causes TensorFlow to perform a heap out-of-bounds read, potentially leading to undefined behavior such as application crashes or information disclosure. The issue affects multiple TensorFlow versions: all versions from 2.8.0 up to but not including 2.8.4, versions from 2.9.0 up to but not including 2.9.3, and versions from 2.10.0 up to but not including 2.10.1. The vulnerability was patched in GitHub commit 717ca98d8c3bba348ff62281fdf38dcb5ea1ec92, with fixes backported to supported TensorFlow versions 2.8.4, 2.9.3, and 2.10.1. No known exploits have been reported in the wild to date. The vulnerability does not require authentication or user interaction to be triggered, but exploitation requires supplying crafted input to the vulnerable TensorFlow operation, which is typically done programmatically within machine learning workflows or applications using TensorFlow. The out-of-bounds read primarily impacts the integrity and availability of the affected system, as it can cause crashes or unpredictable behavior. Confidentiality impact is possible but less likely, depending on how the out-of-bounds read is leveraged. Given TensorFlow's widespread use in research, enterprise AI applications, and cloud services, this vulnerability could affect a broad range of environments where vulnerable TensorFlow versions are deployed.

Potential Impact

For European organizations, the impact of CVE-2022-41895 depends on the extent of TensorFlow usage within their AI and machine learning infrastructure. Organizations relying on vulnerable TensorFlow versions for critical AI workloads may experience application instability, crashes, or potential data leakage due to the out-of-bounds read. This could disrupt AI-driven services, analytics, or automated decision-making processes, impacting business continuity and operational integrity. Sectors such as finance, healthcare, manufacturing, and automotive industries in Europe, which increasingly integrate AI technologies, could be particularly affected. Additionally, cloud service providers and research institutions using TensorFlow may face risks of service degradation or exposure of sensitive model data. While no active exploitation is known, the presence of this vulnerability in supported TensorFlow versions means that unpatched systems remain at risk, especially if adversaries develop exploits targeting this flaw. The vulnerability's impact on availability and integrity could also indirectly affect compliance with European data protection regulations if AI systems process personal or sensitive data.

Mitigation Recommendations

European organizations should prioritize upgrading TensorFlow to patched versions: 2.8.4, 2.9.3, 2.10.1, or later. Specifically, any deployment running versions >=2.8.0 and <2.8.4, >=2.9.0 and <2.9.3, or >=2.10.0 and <2.10.1 must be updated promptly. Beyond upgrading, organizations should audit their machine learning pipelines to identify any use of the `MirrorPadGrad` operation or related padding inputs that could be manipulated. Implement input validation and sanitization controls to ensure that padding parameters do not exceed expected bounds before being passed to TensorFlow operations. For environments where immediate upgrading is not feasible, consider isolating vulnerable TensorFlow workloads and monitoring for anomalous crashes or memory errors that could indicate exploitation attempts. Incorporate runtime application self-protection (RASP) or memory safety tools to detect and prevent out-of-bounds memory accesses. Additionally, maintain strict access controls on systems running TensorFlow to limit exposure to untrusted inputs that could trigger the vulnerability. Finally, stay informed on threat intelligence updates regarding any emerging exploits targeting this vulnerability.

Need more detailed analysis?Get Pro

Technical Details

Data Version
5.1
Assigner Short Name
GitHub_M
Date Reserved
2022-09-30T00:00:00.000Z
Cisa Enriched
true

Threat ID: 682d9849c4522896dcbf6cf6

Added to database: 5/21/2025, 9:09:29 AM

Last enriched: 6/21/2025, 9:08:13 PM

Last updated: 8/11/2025, 7:12:30 PM

Views: 13

Actions

PRO

Updates to AI analysis are available only with a Pro account. Contact root@offseq.com for access.

Please log in to the Console to use AI analysis features.

Need enhanced features?

Contact root@offseq.com for Pro access with improved analysis and higher rate limits.

Latest Threats