Skip to main content

CVE-2023-38675: CWE-369 Divide By Zero in PaddlePaddle PaddlePaddle

Medium
VulnerabilityCVE-2023-38675cvecve-2023-38675cwe-369
Published: Wed Jan 03 2024 (01/03/2024, 08:10:48 UTC)
Source: CVE
Vendor/Project: PaddlePaddle
Product: PaddlePaddle

Description

FPE in paddle.linalg.matrix_rank in PaddlePaddle before 2.6.0. This flaw can cause a runtime crash and a denial of service.

AI-Powered Analysis

AILast updated: 07/07/2025, 14:55:33 UTC

Technical Analysis

CVE-2023-38675 is a medium-severity vulnerability identified in PaddlePaddle, an open-source deep learning platform developed by Baidu. The flaw is categorized under CWE-369 (Divide By Zero) and specifically affects the function paddle.linalg.matrix_rank in versions of PaddlePaddle prior to 2.6.0. This vulnerability manifests as a floating point exception (FPE) caused by a divide-by-zero error during the execution of matrix rank calculations. When triggered, this flaw can cause the affected application to crash at runtime, resulting in a denial of service (DoS) condition. The vulnerability does not impact confidentiality or integrity but affects availability by causing unexpected termination of processes relying on PaddlePaddle’s matrix rank computations. Exploitation requires no privileges (AV:N/PR:N) but does require user interaction (UI:R), such as submitting crafted input data that triggers the divide-by-zero condition. The scope is considered changed (S:C) because the crash can affect multiple components or services using the vulnerable library. No known exploits are currently reported in the wild, and no official patches have been linked yet. The CVSS v3.1 base score is 4.7, reflecting a medium severity level primarily due to the potential for denial of service without direct data compromise. This vulnerability is relevant to organizations using PaddlePaddle for machine learning workloads, especially where matrix rank computations are integral to the processing pipeline.

Potential Impact

For European organizations, the impact of CVE-2023-38675 centers on availability disruptions in AI and machine learning applications that utilize PaddlePaddle. Industries such as finance, healthcare, automotive, and research institutions that rely on AI models for critical decision-making or operational automation could experience service interruptions or degraded performance if the vulnerability is exploited. Denial of service in AI workloads may delay data processing, model training, or inference tasks, potentially affecting business continuity and operational efficiency. While the vulnerability does not lead to data breaches or unauthorized access, the interruption of AI services can have cascading effects on dependent systems and services. Organizations with real-time or high-availability AI deployments are particularly at risk. Additionally, the requirement for user interaction to trigger the flaw means that exposed AI service endpoints accepting external input could be vectors for exploitation. The absence of known exploits reduces immediate risk but does not eliminate the threat, especially as attackers often develop exploits post-disclosure.

Mitigation Recommendations

European organizations should prioritize upgrading PaddlePaddle to version 2.6.0 or later, where this divide-by-zero vulnerability is addressed. Until patches are available, organizations can implement input validation and sanitization to detect and reject inputs that could cause matrix rank computations to trigger divide-by-zero errors. Monitoring application logs for crashes or abnormal termination related to paddle.linalg.matrix_rank usage can help detect exploitation attempts. Deploying runtime application self-protection (RASP) or sandboxing AI workloads may limit the impact of crashes. Restricting access to AI service endpoints to trusted users and networks reduces the risk of malicious input triggering the flaw. Additionally, organizations should conduct thorough testing of AI pipelines with edge-case inputs to identify potential failure points. Maintaining an incident response plan that includes AI service availability monitoring and rapid recovery procedures will mitigate operational impact. Collaboration with PaddlePaddle community and vendors for timely patch releases and security advisories is also recommended.

Need more detailed analysis?Get Pro

Technical Details

Data Version
5.1
Assigner Short Name
Baidu
Date Reserved
2023-07-24T07:55:02.091Z
Cisa Enriched
true
Cvss Version
3.1
State
PUBLISHED

Threat ID: 682dec48c4522896dcc00a7a

Added to database: 5/21/2025, 3:07:52 PM

Last enriched: 7/7/2025, 2:55:33 PM

Last updated: 8/18/2025, 4:11:03 AM

Views: 13

Actions

PRO

Updates to AI analysis are available only with a Pro account. Contact root@offseq.com for access.

Please log in to the Console to use AI analysis features.

Need enhanced features?

Contact root@offseq.com for Pro access with improved analysis and higher rate limits.

Latest Threats