Skip to main content

CVE-2023-38674: CWE-369 Divide By Zero in PaddlePaddle PaddlePaddle

Medium
VulnerabilityCVE-2023-38674cvecve-2023-38674cwe-369
Published: Wed Jan 03 2024 (01/03/2024, 08:10:10 UTC)
Source: CVE Database V5
Vendor/Project: PaddlePaddle
Product: PaddlePaddle

Description

FPE in paddle.nanmedian in PaddlePaddle before 2.6.0. This flaw can cause a runtime crash and a denial of service.

AI-Powered Analysis

AILast updated: 07/08/2025, 12:12:23 UTC

Technical Analysis

CVE-2023-38674 is a medium-severity vulnerability identified in PaddlePaddle, an open-source deep learning platform developed by Baidu. The flaw is classified under CWE-369 (Divide By Zero) and specifically affects the function paddle.nanmedian in versions of PaddlePaddle prior to 2.6.0. The vulnerability manifests as a floating-point exception (FPE) caused by a divide-by-zero error during the execution of the nanmedian function, which is used to compute the median of an array while ignoring NaN values. This flaw can trigger a runtime crash of the application using PaddlePaddle, leading to a denial of service (DoS) condition. The CVSS v3.1 base score is 4.7, indicating a medium severity level. The attack vector is network-based (AV:N), requires no privileges (PR:N), but does require user interaction (UI:R), and the scope is changed (S:C), meaning the vulnerability can affect resources beyond the vulnerable component. There is no impact on confidentiality or integrity, only availability is affected. No known exploits are currently reported in the wild, and no official patches have been linked yet. The vulnerability was reserved in July 2023 and published in January 2024. The root cause is a lack of proper input validation or error handling in the nanmedian function, which can lead to an unhandled divide-by-zero exception when processing certain input data sets.

Potential Impact

For European organizations utilizing PaddlePaddle for machine learning and AI workloads, this vulnerability poses a risk of service disruption. Since PaddlePaddle is used in AI model training and inference pipelines, a denial of service can interrupt critical data processing tasks, delay AI-driven decision-making, and degrade operational efficiency. Industries such as finance, healthcare, automotive, and manufacturing that rely on AI models for predictive analytics, diagnostics, or automation could experience downtime or degraded service quality. The impact is primarily on availability, with no direct data breach or integrity compromise reported. However, repeated crashes could lead to operational delays and increased maintenance costs. The requirement for user interaction to trigger the vulnerability suggests that exploitation might occur through crafted inputs or API calls, potentially from internal or external users. Organizations with exposed AI model endpoints or collaborative environments where users can submit data to PaddlePaddle processes are at higher risk.

Mitigation Recommendations

European organizations should promptly upgrade PaddlePaddle to version 2.6.0 or later once available, as this version addresses the divide-by-zero flaw in the nanmedian function. Until patches are applied, organizations should implement input validation and sanitization on all data fed into PaddlePaddle, especially inputs to the nanmedian function, to prevent zero or invalid values that could trigger the divide-by-zero error. Monitoring and logging of PaddlePaddle runtime errors should be enhanced to detect early signs of crashes or abnormal behavior. Access controls should be tightened to restrict who can submit data or interact with PaddlePaddle services, minimizing the risk of malicious or accidental triggering of the vulnerability. Additionally, organizations should consider isolating AI workloads in containerized or sandboxed environments to limit the impact of potential crashes. Regular backups and failover mechanisms for AI services can help maintain availability during incidents. Security teams should stay alert for any emerging exploit reports and apply patches promptly.

Need more detailed analysis?Get Pro

Technical Details

Data Version
5.1
Assigner Short Name
Baidu
Date Reserved
2023-07-24T07:55:02.091Z
Cvss Version
3.1
State
PUBLISHED

Threat ID: 68434c7e71f4d251b5dd840d

Added to database: 6/6/2025, 8:15:58 PM

Last enriched: 7/8/2025, 12:12:23 PM

Last updated: 7/30/2025, 4:12:15 AM

Views: 7

Actions

PRO

Updates to AI analysis are available only with a Pro account. Contact root@offseq.com for access.

Please log in to the Console to use AI analysis features.

Need enhanced features?

Contact root@offseq.com for Pro access with improved analysis and higher rate limits.

Latest Threats