CVE-2023-38675: CWE-369 Divide By Zero in PaddlePaddle PaddlePaddle
FPE in paddle.linalg.matrix_rank in PaddlePaddle before 2.6.0. This flaw can cause a runtime crash and a denial of service.
AI Analysis
Technical Summary
CVE-2023-38675 is a medium-severity vulnerability identified in PaddlePaddle, an open-source deep learning platform developed by Baidu. The flaw is categorized under CWE-369 (Divide By Zero) and specifically affects the function paddle.linalg.matrix_rank in versions of PaddlePaddle prior to 2.6.0. This vulnerability manifests as a floating point exception (FPE) caused by a divide-by-zero error during the execution of matrix rank calculations. When triggered, this flaw can cause the affected application to crash at runtime, resulting in a denial of service (DoS) condition. The vulnerability does not impact confidentiality or integrity but affects availability by causing unexpected termination of processes relying on PaddlePaddle’s matrix rank computations. Exploitation requires no privileges (AV:N/PR:N) but does require user interaction (UI:R), such as submitting crafted input data that triggers the divide-by-zero condition. The scope is considered changed (S:C) because the crash can affect multiple components or services using the vulnerable library. No known exploits are currently reported in the wild, and no official patches have been linked yet. The CVSS v3.1 base score is 4.7, reflecting a medium severity level primarily due to the potential for denial of service without direct data compromise. This vulnerability is relevant to organizations using PaddlePaddle for machine learning workloads, especially where matrix rank computations are integral to the processing pipeline.
Potential Impact
For European organizations, the impact of CVE-2023-38675 centers on availability disruptions in AI and machine learning applications that utilize PaddlePaddle. Industries such as finance, healthcare, automotive, and research institutions that rely on AI models for critical decision-making or operational automation could experience service interruptions or degraded performance if the vulnerability is exploited. Denial of service in AI workloads may delay data processing, model training, or inference tasks, potentially affecting business continuity and operational efficiency. While the vulnerability does not lead to data breaches or unauthorized access, the interruption of AI services can have cascading effects on dependent systems and services. Organizations with real-time or high-availability AI deployments are particularly at risk. Additionally, the requirement for user interaction to trigger the flaw means that exposed AI service endpoints accepting external input could be vectors for exploitation. The absence of known exploits reduces immediate risk but does not eliminate the threat, especially as attackers often develop exploits post-disclosure.
Mitigation Recommendations
European organizations should prioritize upgrading PaddlePaddle to version 2.6.0 or later, where this divide-by-zero vulnerability is addressed. Until patches are available, organizations can implement input validation and sanitization to detect and reject inputs that could cause matrix rank computations to trigger divide-by-zero errors. Monitoring application logs for crashes or abnormal termination related to paddle.linalg.matrix_rank usage can help detect exploitation attempts. Deploying runtime application self-protection (RASP) or sandboxing AI workloads may limit the impact of crashes. Restricting access to AI service endpoints to trusted users and networks reduces the risk of malicious input triggering the flaw. Additionally, organizations should conduct thorough testing of AI pipelines with edge-case inputs to identify potential failure points. Maintaining an incident response plan that includes AI service availability monitoring and rapid recovery procedures will mitigate operational impact. Collaboration with PaddlePaddle community and vendors for timely patch releases and security advisories is also recommended.
Affected Countries
Germany, France, United Kingdom, Netherlands, Sweden, Finland, Italy
CVE-2023-38675: CWE-369 Divide By Zero in PaddlePaddle PaddlePaddle
Description
FPE in paddle.linalg.matrix_rank in PaddlePaddle before 2.6.0. This flaw can cause a runtime crash and a denial of service.
AI-Powered Analysis
Technical Analysis
CVE-2023-38675 is a medium-severity vulnerability identified in PaddlePaddle, an open-source deep learning platform developed by Baidu. The flaw is categorized under CWE-369 (Divide By Zero) and specifically affects the function paddle.linalg.matrix_rank in versions of PaddlePaddle prior to 2.6.0. This vulnerability manifests as a floating point exception (FPE) caused by a divide-by-zero error during the execution of matrix rank calculations. When triggered, this flaw can cause the affected application to crash at runtime, resulting in a denial of service (DoS) condition. The vulnerability does not impact confidentiality or integrity but affects availability by causing unexpected termination of processes relying on PaddlePaddle’s matrix rank computations. Exploitation requires no privileges (AV:N/PR:N) but does require user interaction (UI:R), such as submitting crafted input data that triggers the divide-by-zero condition. The scope is considered changed (S:C) because the crash can affect multiple components or services using the vulnerable library. No known exploits are currently reported in the wild, and no official patches have been linked yet. The CVSS v3.1 base score is 4.7, reflecting a medium severity level primarily due to the potential for denial of service without direct data compromise. This vulnerability is relevant to organizations using PaddlePaddle for machine learning workloads, especially where matrix rank computations are integral to the processing pipeline.
Potential Impact
For European organizations, the impact of CVE-2023-38675 centers on availability disruptions in AI and machine learning applications that utilize PaddlePaddle. Industries such as finance, healthcare, automotive, and research institutions that rely on AI models for critical decision-making or operational automation could experience service interruptions or degraded performance if the vulnerability is exploited. Denial of service in AI workloads may delay data processing, model training, or inference tasks, potentially affecting business continuity and operational efficiency. While the vulnerability does not lead to data breaches or unauthorized access, the interruption of AI services can have cascading effects on dependent systems and services. Organizations with real-time or high-availability AI deployments are particularly at risk. Additionally, the requirement for user interaction to trigger the flaw means that exposed AI service endpoints accepting external input could be vectors for exploitation. The absence of known exploits reduces immediate risk but does not eliminate the threat, especially as attackers often develop exploits post-disclosure.
Mitigation Recommendations
European organizations should prioritize upgrading PaddlePaddle to version 2.6.0 or later, where this divide-by-zero vulnerability is addressed. Until patches are available, organizations can implement input validation and sanitization to detect and reject inputs that could cause matrix rank computations to trigger divide-by-zero errors. Monitoring application logs for crashes or abnormal termination related to paddle.linalg.matrix_rank usage can help detect exploitation attempts. Deploying runtime application self-protection (RASP) or sandboxing AI workloads may limit the impact of crashes. Restricting access to AI service endpoints to trusted users and networks reduces the risk of malicious input triggering the flaw. Additionally, organizations should conduct thorough testing of AI pipelines with edge-case inputs to identify potential failure points. Maintaining an incident response plan that includes AI service availability monitoring and rapid recovery procedures will mitigate operational impact. Collaboration with PaddlePaddle community and vendors for timely patch releases and security advisories is also recommended.
Affected Countries
For access to advanced analysis and higher rate limits, contact root@offseq.com
Technical Details
- Data Version
- 5.1
- Assigner Short Name
- Baidu
- Date Reserved
- 2023-07-24T07:55:02.091Z
- Cisa Enriched
- true
- Cvss Version
- 3.1
- State
- PUBLISHED
Threat ID: 682dec48c4522896dcc00a7a
Added to database: 5/21/2025, 3:07:52 PM
Last enriched: 7/7/2025, 2:55:33 PM
Last updated: 8/18/2025, 4:11:03 AM
Views: 13
Related Threats
CVE-2025-53948: CWE-415 Double Free in Santesoft Sante PACS Server
HighCVE-2025-52584: CWE-122 Heap-based Buffer Overflow in Ashlar-Vellum Cobalt
HighCVE-2025-46269: CWE-122 Heap-based Buffer Overflow in Ashlar-Vellum Cobalt
HighCVE-2025-54862: CWE-79 Improper Neutralization of Input During Web Page Generation (XSS or 'Cross-site Scripting') in Santesoft Sante PACS Server
MediumCVE-2025-54759: CWE-79 Improper Neutralization of Input During Web Page Generation (XSS or 'Cross-site Scripting') in Santesoft Sante PACS Server
MediumActions
Updates to AI analysis are available only with a Pro account. Contact root@offseq.com for access.
External Links
Need enhanced features?
Contact root@offseq.com for Pro access with improved analysis and higher rate limits.