CVE-2022-41902: CWE-787: Out-of-bounds Write in tensorflow tensorflow
TensorFlow is an open source platform for machine learning. The function MakeGrapplerFunctionItem takes arguments that determine the sizes of inputs and outputs. If the inputs given are greater than or equal to the sizes of the outputs, an out-of-bounds memory read or a crash is triggered. We have patched the issue in GitHub commit a65411a1d69edfb16b25907ffb8f73556ce36bb7. The fix will be included in TensorFlow 2.11.0. We will also cherrypick this commit on TensorFlow 2.8.4, 2.9.3, and 2.10.1.
AI Analysis
Technical Summary
CVE-2022-41902 is a medium-severity vulnerability classified under CWE-787 (Out-of-bounds Write) affecting TensorFlow, an open-source machine learning platform widely used for developing and deploying machine learning models. The vulnerability arises in the function MakeGrapplerFunctionItem, which processes arguments that specify the sizes of inputs and outputs. If the number of inputs provided is greater than or equal to the number of outputs, this can trigger an out-of-bounds memory read or cause the application to crash. This behavior indicates improper bounds checking, which can lead to memory corruption. The vulnerability affects TensorFlow versions prior to 2.8.4, versions from 2.9.0 up to but not including 2.9.3, and versions from 2.10.0 up to but not including 2.10.1. The issue has been patched in TensorFlow 2.11.0 and backported to 2.8.4, 2.9.3, and 2.10.1. No known exploits have been reported in the wild to date. The vulnerability could be triggered by specially crafted inputs to the affected function, potentially causing denial of service due to crashes or memory corruption. However, there is no evidence that this vulnerability allows for arbitrary code execution or privilege escalation. The vulnerability requires the attacker to have the ability to supply inputs to the affected TensorFlow function, which typically implies some level of access to the machine learning environment or application using TensorFlow. No user interaction beyond this is required.
Potential Impact
For European organizations, the impact of CVE-2022-41902 depends largely on the extent to which TensorFlow is integrated into their machine learning workflows and production environments. Organizations in sectors such as finance, healthcare, automotive, and telecommunications that rely on TensorFlow for critical AI-driven applications could face service disruptions if the vulnerability is exploited to cause crashes or memory corruption. This could lead to denial of service conditions, affecting availability and potentially delaying critical decision-making processes. While the vulnerability does not appear to allow direct code execution or data exfiltration, memory corruption issues can sometimes be leveraged in complex attack chains, especially in environments where TensorFlow is exposed to untrusted inputs. Given the increasing adoption of AI and machine learning in European industries, the vulnerability poses a moderate risk to operational stability and reliability. Additionally, organizations subject to strict data protection regulations (e.g., GDPR) must consider the risk of service interruptions and potential indirect impacts on data integrity and confidentiality.
Mitigation Recommendations
European organizations should prioritize upgrading TensorFlow installations to version 2.11.0 or later, or apply the relevant patches backported to versions 2.8.4, 2.9.3, and 2.10.1. It is critical to audit all machine learning pipelines and applications to identify any use of affected TensorFlow versions. Organizations should implement strict input validation and sanitization controls on any interfaces that accept inputs to TensorFlow functions, minimizing the risk of malformed inputs triggering the vulnerability. Deploying runtime protections such as memory safety tools (e.g., AddressSanitizer) during development and testing can help detect out-of-bounds conditions early. Monitoring and logging should be enhanced around TensorFlow processes to detect abnormal crashes or memory errors that could indicate exploitation attempts. For environments where upgrading is not immediately feasible, isolating TensorFlow workloads in sandboxed or containerized environments can reduce the blast radius of potential crashes. Finally, organizations should maintain an inventory of machine learning assets and ensure that security patches are integrated into their regular update cycles.
Affected Countries
Germany, France, United Kingdom, Netherlands, Sweden, Finland, Italy, Spain
CVE-2022-41902: CWE-787: Out-of-bounds Write in tensorflow tensorflow
Description
TensorFlow is an open source platform for machine learning. The function MakeGrapplerFunctionItem takes arguments that determine the sizes of inputs and outputs. If the inputs given are greater than or equal to the sizes of the outputs, an out-of-bounds memory read or a crash is triggered. We have patched the issue in GitHub commit a65411a1d69edfb16b25907ffb8f73556ce36bb7. The fix will be included in TensorFlow 2.11.0. We will also cherrypick this commit on TensorFlow 2.8.4, 2.9.3, and 2.10.1.
AI-Powered Analysis
Technical Analysis
CVE-2022-41902 is a medium-severity vulnerability classified under CWE-787 (Out-of-bounds Write) affecting TensorFlow, an open-source machine learning platform widely used for developing and deploying machine learning models. The vulnerability arises in the function MakeGrapplerFunctionItem, which processes arguments that specify the sizes of inputs and outputs. If the number of inputs provided is greater than or equal to the number of outputs, this can trigger an out-of-bounds memory read or cause the application to crash. This behavior indicates improper bounds checking, which can lead to memory corruption. The vulnerability affects TensorFlow versions prior to 2.8.4, versions from 2.9.0 up to but not including 2.9.3, and versions from 2.10.0 up to but not including 2.10.1. The issue has been patched in TensorFlow 2.11.0 and backported to 2.8.4, 2.9.3, and 2.10.1. No known exploits have been reported in the wild to date. The vulnerability could be triggered by specially crafted inputs to the affected function, potentially causing denial of service due to crashes or memory corruption. However, there is no evidence that this vulnerability allows for arbitrary code execution or privilege escalation. The vulnerability requires the attacker to have the ability to supply inputs to the affected TensorFlow function, which typically implies some level of access to the machine learning environment or application using TensorFlow. No user interaction beyond this is required.
Potential Impact
For European organizations, the impact of CVE-2022-41902 depends largely on the extent to which TensorFlow is integrated into their machine learning workflows and production environments. Organizations in sectors such as finance, healthcare, automotive, and telecommunications that rely on TensorFlow for critical AI-driven applications could face service disruptions if the vulnerability is exploited to cause crashes or memory corruption. This could lead to denial of service conditions, affecting availability and potentially delaying critical decision-making processes. While the vulnerability does not appear to allow direct code execution or data exfiltration, memory corruption issues can sometimes be leveraged in complex attack chains, especially in environments where TensorFlow is exposed to untrusted inputs. Given the increasing adoption of AI and machine learning in European industries, the vulnerability poses a moderate risk to operational stability and reliability. Additionally, organizations subject to strict data protection regulations (e.g., GDPR) must consider the risk of service interruptions and potential indirect impacts on data integrity and confidentiality.
Mitigation Recommendations
European organizations should prioritize upgrading TensorFlow installations to version 2.11.0 or later, or apply the relevant patches backported to versions 2.8.4, 2.9.3, and 2.10.1. It is critical to audit all machine learning pipelines and applications to identify any use of affected TensorFlow versions. Organizations should implement strict input validation and sanitization controls on any interfaces that accept inputs to TensorFlow functions, minimizing the risk of malformed inputs triggering the vulnerability. Deploying runtime protections such as memory safety tools (e.g., AddressSanitizer) during development and testing can help detect out-of-bounds conditions early. Monitoring and logging should be enhanced around TensorFlow processes to detect abnormal crashes or memory errors that could indicate exploitation attempts. For environments where upgrading is not immediately feasible, isolating TensorFlow workloads in sandboxed or containerized environments can reduce the blast radius of potential crashes. Finally, organizations should maintain an inventory of machine learning assets and ensure that security patches are integrated into their regular update cycles.
Affected Countries
For access to advanced analysis and higher rate limits, contact root@offseq.com
Technical Details
- Data Version
- 5.1
- Assigner Short Name
- GitHub_M
- Date Reserved
- 2022-09-30T00:00:00.000Z
- Cisa Enriched
- true
Threat ID: 682d9846c4522896dcbf4d39
Added to database: 5/21/2025, 9:09:26 AM
Last enriched: 6/22/2025, 12:22:31 PM
Last updated: 7/25/2025, 3:45:29 PM
Views: 10
Related Threats
CVE-2025-8842: Use After Free in NASM Netwide Assember
MediumCVE-2025-8841: Unrestricted Upload in zlt2000 microservices-platform
MediumCVE-2025-8840: Improper Authorization in jshERP
MediumCVE-2025-8853: CWE-290 Authentication Bypass by Spoofing in 2100 Technology Official Document Management System
CriticalCVE-2025-8838: Improper Authentication in WinterChenS my-site
MediumActions
Updates to AI analysis are available only with a Pro account. Contact root@offseq.com for access.
External Links
Need enhanced features?
Contact root@offseq.com for Pro access with improved analysis and higher rate limits.