CVE-2022-41901: CWE-20: Improper Input Validation in tensorflow tensorflow
TensorFlow is an open source platform for machine learning. An input `sparse_matrix` that is not a matrix with a shape with rank 0 will trigger a `CHECK` fail in `tf.raw_ops.SparseMatrixNNZ`. We have patched the issue in GitHub commit f856d02e5322821aad155dad9b3acab1e9f5d693. The fix will be included in TensorFlow 2.11. We will also cherrypick this commit on TensorFlow 2.10.1, 2.9.3, and TensorFlow 2.8.4, as these are also affected and still in supported range.
AI Analysis
Technical Summary
CVE-2022-41901 is a medium-severity vulnerability in TensorFlow, an open-source machine learning platform widely used for developing and deploying machine learning models. The vulnerability arises from improper input validation (CWE-20) in the TensorFlow operation `tf.raw_ops.SparseMatrixNNZ`. Specifically, if the input parameter `sparse_matrix` is provided with data that is not a matrix or has a shape with rank 0, it triggers a `CHECK` failure within the operation. This improper validation can cause the TensorFlow process to crash or terminate unexpectedly, leading to a denial-of-service (DoS) condition. The issue affects TensorFlow versions prior to 2.10.1 (specifically >= 2.10.0 and < 2.10.1), versions >= 2.9.0 and < 2.9.3, and versions below 2.8.4. The vulnerability was addressed in a GitHub commit (f856d02e5322821aad155dad9b3acab1e9f5d693) and the fix has been backported to supported versions 2.8.4, 2.9.3, and 2.10.1. There are no known exploits in the wild at this time. The vulnerability requires an attacker to supply malformed input to the TensorFlow operation, which may be possible in environments where untrusted data is processed. This vulnerability primarily impacts the availability of TensorFlow-based services by causing crashes due to failed input validation, but does not directly lead to code execution or data leakage.
Potential Impact
For European organizations, the impact of CVE-2022-41901 is mainly related to service availability and operational stability of machine learning applications that utilize vulnerable TensorFlow versions. Organizations deploying TensorFlow in production environments, especially those processing untrusted or external data inputs, may experience unexpected application crashes or denial-of-service conditions if an attacker supplies malformed sparse matrix inputs. This could disrupt critical AI-driven services such as predictive analytics, automated decision-making, or real-time data processing. While the vulnerability does not directly compromise confidentiality or integrity, the resulting downtime could affect business continuity, regulatory compliance (e.g., GDPR requirements for service availability), and customer trust. Sectors heavily reliant on AI/ML, such as finance, healthcare, manufacturing, and telecommunications, may face operational risks if vulnerable TensorFlow versions are used without patching. Additionally, organizations offering AI services or cloud-based ML platforms in Europe could see reputational damage or contractual penalties if service disruptions occur due to this vulnerability.
Mitigation Recommendations
European organizations should implement the following specific mitigation measures: 1) Upgrade TensorFlow installations to patched versions 2.10.1, 2.9.3, or 2.8.4 as appropriate to their environment to ensure the fix is applied. 2) Conduct an inventory of all TensorFlow deployments, including containerized and embedded environments, to identify vulnerable versions. 3) Implement strict input validation and sanitization at the application layer before passing data to TensorFlow operations, especially when processing sparse matrix inputs from untrusted sources. 4) Employ runtime monitoring and anomaly detection to identify abnormal crashes or failures in TensorFlow-based services that could indicate exploitation attempts. 5) For environments where immediate patching is not feasible, consider isolating TensorFlow workloads or limiting exposure to untrusted inputs to reduce attack surface. 6) Engage with ML development teams to review code paths that invoke `tf.raw_ops.SparseMatrixNNZ` and ensure robust error handling to prevent cascading failures. 7) Maintain up-to-date backups and incident response plans to quickly recover from potential service disruptions caused by this vulnerability.
Affected Countries
Germany, France, United Kingdom, Netherlands, Sweden, Finland, Denmark, Ireland, Italy, Spain
CVE-2022-41901: CWE-20: Improper Input Validation in tensorflow tensorflow
Description
TensorFlow is an open source platform for machine learning. An input `sparse_matrix` that is not a matrix with a shape with rank 0 will trigger a `CHECK` fail in `tf.raw_ops.SparseMatrixNNZ`. We have patched the issue in GitHub commit f856d02e5322821aad155dad9b3acab1e9f5d693. The fix will be included in TensorFlow 2.11. We will also cherrypick this commit on TensorFlow 2.10.1, 2.9.3, and TensorFlow 2.8.4, as these are also affected and still in supported range.
AI-Powered Analysis
Technical Analysis
CVE-2022-41901 is a medium-severity vulnerability in TensorFlow, an open-source machine learning platform widely used for developing and deploying machine learning models. The vulnerability arises from improper input validation (CWE-20) in the TensorFlow operation `tf.raw_ops.SparseMatrixNNZ`. Specifically, if the input parameter `sparse_matrix` is provided with data that is not a matrix or has a shape with rank 0, it triggers a `CHECK` failure within the operation. This improper validation can cause the TensorFlow process to crash or terminate unexpectedly, leading to a denial-of-service (DoS) condition. The issue affects TensorFlow versions prior to 2.10.1 (specifically >= 2.10.0 and < 2.10.1), versions >= 2.9.0 and < 2.9.3, and versions below 2.8.4. The vulnerability was addressed in a GitHub commit (f856d02e5322821aad155dad9b3acab1e9f5d693) and the fix has been backported to supported versions 2.8.4, 2.9.3, and 2.10.1. There are no known exploits in the wild at this time. The vulnerability requires an attacker to supply malformed input to the TensorFlow operation, which may be possible in environments where untrusted data is processed. This vulnerability primarily impacts the availability of TensorFlow-based services by causing crashes due to failed input validation, but does not directly lead to code execution or data leakage.
Potential Impact
For European organizations, the impact of CVE-2022-41901 is mainly related to service availability and operational stability of machine learning applications that utilize vulnerable TensorFlow versions. Organizations deploying TensorFlow in production environments, especially those processing untrusted or external data inputs, may experience unexpected application crashes or denial-of-service conditions if an attacker supplies malformed sparse matrix inputs. This could disrupt critical AI-driven services such as predictive analytics, automated decision-making, or real-time data processing. While the vulnerability does not directly compromise confidentiality or integrity, the resulting downtime could affect business continuity, regulatory compliance (e.g., GDPR requirements for service availability), and customer trust. Sectors heavily reliant on AI/ML, such as finance, healthcare, manufacturing, and telecommunications, may face operational risks if vulnerable TensorFlow versions are used without patching. Additionally, organizations offering AI services or cloud-based ML platforms in Europe could see reputational damage or contractual penalties if service disruptions occur due to this vulnerability.
Mitigation Recommendations
European organizations should implement the following specific mitigation measures: 1) Upgrade TensorFlow installations to patched versions 2.10.1, 2.9.3, or 2.8.4 as appropriate to their environment to ensure the fix is applied. 2) Conduct an inventory of all TensorFlow deployments, including containerized and embedded environments, to identify vulnerable versions. 3) Implement strict input validation and sanitization at the application layer before passing data to TensorFlow operations, especially when processing sparse matrix inputs from untrusted sources. 4) Employ runtime monitoring and anomaly detection to identify abnormal crashes or failures in TensorFlow-based services that could indicate exploitation attempts. 5) For environments where immediate patching is not feasible, consider isolating TensorFlow workloads or limiting exposure to untrusted inputs to reduce attack surface. 6) Engage with ML development teams to review code paths that invoke `tf.raw_ops.SparseMatrixNNZ` and ensure robust error handling to prevent cascading failures. 7) Maintain up-to-date backups and incident response plans to quickly recover from potential service disruptions caused by this vulnerability.
For access to advanced analysis and higher rate limits, contact root@offseq.com
Technical Details
- Data Version
- 5.1
- Assigner Short Name
- GitHub_M
- Date Reserved
- 2022-09-30T00:00:00.000Z
- Cisa Enriched
- true
Threat ID: 682d9849c4522896dcbf6d2d
Added to database: 5/21/2025, 9:09:29 AM
Last enriched: 6/21/2025, 8:54:38 PM
Last updated: 7/26/2025, 4:21:34 AM
Views: 12
Related Threats
CVE-2025-25235: CWE-918 Server-Side Request Forgery (SSRF) in Omnissa Secure Email Gateway
HighCVE-2025-55151: CWE-918: Server-Side Request Forgery (SSRF) in Stirling-Tools Stirling-PDF
HighCVE-2025-55150: CWE-918: Server-Side Request Forgery (SSRF) in Stirling-Tools Stirling-PDF
HighCVE-2025-54992: CWE-611: Improper Restriction of XML External Entity Reference in telstra open-kilda
MediumCVE-2025-55012: CWE-288: Authentication Bypass Using an Alternate Path or Channel in zed-industries zed
HighActions
Updates to AI analysis are available only with a Pro account. Contact root@offseq.com for access.
External Links
Need enhanced features?
Contact root@offseq.com for Pro access with improved analysis and higher rate limits.