CVE-2023-38674: CWE-369 Divide By Zero in PaddlePaddle PaddlePaddle
FPE in paddle.nanmedian in PaddlePaddle before 2.6.0. This flaw can cause a runtime crash and a denial of service.
AI Analysis
Technical Summary
CVE-2023-38674 is a medium-severity vulnerability identified in PaddlePaddle, an open-source deep learning platform developed by Baidu. The flaw is classified under CWE-369 (Divide By Zero) and specifically affects the function paddle.nanmedian in versions of PaddlePaddle prior to 2.6.0. The vulnerability manifests as a floating-point exception (FPE) caused by a divide-by-zero error during the execution of the nanmedian function, which is used to compute the median of an array while ignoring NaN values. This flaw can trigger a runtime crash of the application using PaddlePaddle, leading to a denial of service (DoS) condition. The CVSS v3.1 base score is 4.7, indicating a medium severity level. The attack vector is network-based (AV:N), requires no privileges (PR:N), but does require user interaction (UI:R), and the scope is changed (S:C), meaning the vulnerability can affect resources beyond the vulnerable component. There is no impact on confidentiality or integrity, only availability is affected. No known exploits are currently reported in the wild, and no official patches have been linked yet. The vulnerability was reserved in July 2023 and published in January 2024. The root cause is a lack of proper input validation or error handling in the nanmedian function, which can lead to an unhandled divide-by-zero exception when processing certain input data sets.
Potential Impact
For European organizations utilizing PaddlePaddle for machine learning and AI workloads, this vulnerability poses a risk of service disruption. Since PaddlePaddle is used in AI model training and inference pipelines, a denial of service can interrupt critical data processing tasks, delay AI-driven decision-making, and degrade operational efficiency. Industries such as finance, healthcare, automotive, and manufacturing that rely on AI models for predictive analytics, diagnostics, or automation could experience downtime or degraded service quality. The impact is primarily on availability, with no direct data breach or integrity compromise reported. However, repeated crashes could lead to operational delays and increased maintenance costs. The requirement for user interaction to trigger the vulnerability suggests that exploitation might occur through crafted inputs or API calls, potentially from internal or external users. Organizations with exposed AI model endpoints or collaborative environments where users can submit data to PaddlePaddle processes are at higher risk.
Mitigation Recommendations
European organizations should promptly upgrade PaddlePaddle to version 2.6.0 or later once available, as this version addresses the divide-by-zero flaw in the nanmedian function. Until patches are applied, organizations should implement input validation and sanitization on all data fed into PaddlePaddle, especially inputs to the nanmedian function, to prevent zero or invalid values that could trigger the divide-by-zero error. Monitoring and logging of PaddlePaddle runtime errors should be enhanced to detect early signs of crashes or abnormal behavior. Access controls should be tightened to restrict who can submit data or interact with PaddlePaddle services, minimizing the risk of malicious or accidental triggering of the vulnerability. Additionally, organizations should consider isolating AI workloads in containerized or sandboxed environments to limit the impact of potential crashes. Regular backups and failover mechanisms for AI services can help maintain availability during incidents. Security teams should stay alert for any emerging exploit reports and apply patches promptly.
Affected Countries
Germany, France, United Kingdom, Netherlands, Sweden, Finland
CVE-2023-38674: CWE-369 Divide By Zero in PaddlePaddle PaddlePaddle
Description
FPE in paddle.nanmedian in PaddlePaddle before 2.6.0. This flaw can cause a runtime crash and a denial of service.
AI-Powered Analysis
Technical Analysis
CVE-2023-38674 is a medium-severity vulnerability identified in PaddlePaddle, an open-source deep learning platform developed by Baidu. The flaw is classified under CWE-369 (Divide By Zero) and specifically affects the function paddle.nanmedian in versions of PaddlePaddle prior to 2.6.0. The vulnerability manifests as a floating-point exception (FPE) caused by a divide-by-zero error during the execution of the nanmedian function, which is used to compute the median of an array while ignoring NaN values. This flaw can trigger a runtime crash of the application using PaddlePaddle, leading to a denial of service (DoS) condition. The CVSS v3.1 base score is 4.7, indicating a medium severity level. The attack vector is network-based (AV:N), requires no privileges (PR:N), but does require user interaction (UI:R), and the scope is changed (S:C), meaning the vulnerability can affect resources beyond the vulnerable component. There is no impact on confidentiality or integrity, only availability is affected. No known exploits are currently reported in the wild, and no official patches have been linked yet. The vulnerability was reserved in July 2023 and published in January 2024. The root cause is a lack of proper input validation or error handling in the nanmedian function, which can lead to an unhandled divide-by-zero exception when processing certain input data sets.
Potential Impact
For European organizations utilizing PaddlePaddle for machine learning and AI workloads, this vulnerability poses a risk of service disruption. Since PaddlePaddle is used in AI model training and inference pipelines, a denial of service can interrupt critical data processing tasks, delay AI-driven decision-making, and degrade operational efficiency. Industries such as finance, healthcare, automotive, and manufacturing that rely on AI models for predictive analytics, diagnostics, or automation could experience downtime or degraded service quality. The impact is primarily on availability, with no direct data breach or integrity compromise reported. However, repeated crashes could lead to operational delays and increased maintenance costs. The requirement for user interaction to trigger the vulnerability suggests that exploitation might occur through crafted inputs or API calls, potentially from internal or external users. Organizations with exposed AI model endpoints or collaborative environments where users can submit data to PaddlePaddle processes are at higher risk.
Mitigation Recommendations
European organizations should promptly upgrade PaddlePaddle to version 2.6.0 or later once available, as this version addresses the divide-by-zero flaw in the nanmedian function. Until patches are applied, organizations should implement input validation and sanitization on all data fed into PaddlePaddle, especially inputs to the nanmedian function, to prevent zero or invalid values that could trigger the divide-by-zero error. Monitoring and logging of PaddlePaddle runtime errors should be enhanced to detect early signs of crashes or abnormal behavior. Access controls should be tightened to restrict who can submit data or interact with PaddlePaddle services, minimizing the risk of malicious or accidental triggering of the vulnerability. Additionally, organizations should consider isolating AI workloads in containerized or sandboxed environments to limit the impact of potential crashes. Regular backups and failover mechanisms for AI services can help maintain availability during incidents. Security teams should stay alert for any emerging exploit reports and apply patches promptly.
Affected Countries
For access to advanced analysis and higher rate limits, contact root@offseq.com
Technical Details
- Data Version
- 5.1
- Assigner Short Name
- Baidu
- Date Reserved
- 2023-07-24T07:55:02.091Z
- Cvss Version
- 3.1
- State
- PUBLISHED
Threat ID: 68434c7e71f4d251b5dd840d
Added to database: 6/6/2025, 8:15:58 PM
Last enriched: 7/8/2025, 12:12:23 PM
Last updated: 7/30/2025, 4:12:15 AM
Views: 7
Related Threats
CVE-2025-9020: Use After Free in PX4 PX4-Autopilot
LowCVE-2025-8604: CWE-79 Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting') in wptb WP Table Builder – WordPress Table Plugin
MediumCVE-2025-9016: Uncontrolled Search Path in Mechrevo Control Center GX V2
HighCVE-2025-8451: CWE-79 Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting') in wpdevteam Essential Addons for Elementor – Popular Elementor Templates & Widgets
MediumCVE-2025-8013: CWE-918 Server-Side Request Forgery (SSRF) in quttera Quttera Web Malware Scanner
LowActions
Updates to AI analysis are available only with a Pro account. Contact root@offseq.com for access.
External Links
Need enhanced features?
Contact root@offseq.com for Pro access with improved analysis and higher rate limits.