CVE-2023-38675: CWE-369 Divide By Zero in PaddlePaddle PaddlePaddle
FPE in paddle.linalg.matrix_rank in PaddlePaddle before 2.6.0. This flaw can cause a runtime crash and a denial of service.
AI Analysis
Technical Summary
CVE-2023-38675 is a medium-severity vulnerability identified in PaddlePaddle, an open-source deep learning platform developed by Baidu. The flaw is categorized under CWE-369 (Divide By Zero) and specifically affects the function paddle.linalg.matrix_rank in versions of PaddlePaddle prior to 2.6.0. This vulnerability manifests as a floating point exception (FPE) caused by a divide-by-zero error during the execution of matrix rank calculations. When triggered, this flaw can cause the affected application to crash at runtime, resulting in a denial of service (DoS) condition. The vulnerability does not impact confidentiality or integrity but affects availability by causing unexpected termination of processes relying on PaddlePaddle’s matrix rank computations. Exploitation requires no privileges (AV:N/PR:N) but does require user interaction (UI:R), such as submitting crafted input data that triggers the divide-by-zero condition. The scope is considered changed (S:C) because the crash can affect multiple components or services using the vulnerable library. No known exploits are currently reported in the wild, and no official patches have been linked yet. The CVSS v3.1 base score is 4.7, reflecting a medium severity level primarily due to the potential for denial of service without direct data compromise. This vulnerability is relevant to organizations using PaddlePaddle for machine learning workloads, especially where matrix rank computations are integral to the processing pipeline.
Potential Impact
For European organizations, the impact of CVE-2023-38675 centers on availability disruptions in AI and machine learning applications that utilize PaddlePaddle. Industries such as finance, healthcare, automotive, and research institutions that rely on AI models for critical decision-making or operational automation could experience service interruptions or degraded performance if the vulnerability is exploited. Denial of service in AI workloads may delay data processing, model training, or inference tasks, potentially affecting business continuity and operational efficiency. While the vulnerability does not lead to data breaches or unauthorized access, the interruption of AI services can have cascading effects on dependent systems and services. Organizations with real-time or high-availability AI deployments are particularly at risk. Additionally, the requirement for user interaction to trigger the flaw means that exposed AI service endpoints accepting external input could be vectors for exploitation. The absence of known exploits reduces immediate risk but does not eliminate the threat, especially as attackers often develop exploits post-disclosure.
Mitigation Recommendations
European organizations should prioritize upgrading PaddlePaddle to version 2.6.0 or later, where this divide-by-zero vulnerability is addressed. Until patches are available, organizations can implement input validation and sanitization to detect and reject inputs that could cause matrix rank computations to trigger divide-by-zero errors. Monitoring application logs for crashes or abnormal termination related to paddle.linalg.matrix_rank usage can help detect exploitation attempts. Deploying runtime application self-protection (RASP) or sandboxing AI workloads may limit the impact of crashes. Restricting access to AI service endpoints to trusted users and networks reduces the risk of malicious input triggering the flaw. Additionally, organizations should conduct thorough testing of AI pipelines with edge-case inputs to identify potential failure points. Maintaining an incident response plan that includes AI service availability monitoring and rapid recovery procedures will mitigate operational impact. Collaboration with PaddlePaddle community and vendors for timely patch releases and security advisories is also recommended.
Affected Countries
Germany, France, United Kingdom, Netherlands, Sweden, Finland, Italy
CVE-2023-38675: CWE-369 Divide By Zero in PaddlePaddle PaddlePaddle
Description
FPE in paddle.linalg.matrix_rank in PaddlePaddle before 2.6.0. This flaw can cause a runtime crash and a denial of service.
AI-Powered Analysis
Technical Analysis
CVE-2023-38675 is a medium-severity vulnerability identified in PaddlePaddle, an open-source deep learning platform developed by Baidu. The flaw is categorized under CWE-369 (Divide By Zero) and specifically affects the function paddle.linalg.matrix_rank in versions of PaddlePaddle prior to 2.6.0. This vulnerability manifests as a floating point exception (FPE) caused by a divide-by-zero error during the execution of matrix rank calculations. When triggered, this flaw can cause the affected application to crash at runtime, resulting in a denial of service (DoS) condition. The vulnerability does not impact confidentiality or integrity but affects availability by causing unexpected termination of processes relying on PaddlePaddle’s matrix rank computations. Exploitation requires no privileges (AV:N/PR:N) but does require user interaction (UI:R), such as submitting crafted input data that triggers the divide-by-zero condition. The scope is considered changed (S:C) because the crash can affect multiple components or services using the vulnerable library. No known exploits are currently reported in the wild, and no official patches have been linked yet. The CVSS v3.1 base score is 4.7, reflecting a medium severity level primarily due to the potential for denial of service without direct data compromise. This vulnerability is relevant to organizations using PaddlePaddle for machine learning workloads, especially where matrix rank computations are integral to the processing pipeline.
Potential Impact
For European organizations, the impact of CVE-2023-38675 centers on availability disruptions in AI and machine learning applications that utilize PaddlePaddle. Industries such as finance, healthcare, automotive, and research institutions that rely on AI models for critical decision-making or operational automation could experience service interruptions or degraded performance if the vulnerability is exploited. Denial of service in AI workloads may delay data processing, model training, or inference tasks, potentially affecting business continuity and operational efficiency. While the vulnerability does not lead to data breaches or unauthorized access, the interruption of AI services can have cascading effects on dependent systems and services. Organizations with real-time or high-availability AI deployments are particularly at risk. Additionally, the requirement for user interaction to trigger the flaw means that exposed AI service endpoints accepting external input could be vectors for exploitation. The absence of known exploits reduces immediate risk but does not eliminate the threat, especially as attackers often develop exploits post-disclosure.
Mitigation Recommendations
European organizations should prioritize upgrading PaddlePaddle to version 2.6.0 or later, where this divide-by-zero vulnerability is addressed. Until patches are available, organizations can implement input validation and sanitization to detect and reject inputs that could cause matrix rank computations to trigger divide-by-zero errors. Monitoring application logs for crashes or abnormal termination related to paddle.linalg.matrix_rank usage can help detect exploitation attempts. Deploying runtime application self-protection (RASP) or sandboxing AI workloads may limit the impact of crashes. Restricting access to AI service endpoints to trusted users and networks reduces the risk of malicious input triggering the flaw. Additionally, organizations should conduct thorough testing of AI pipelines with edge-case inputs to identify potential failure points. Maintaining an incident response plan that includes AI service availability monitoring and rapid recovery procedures will mitigate operational impact. Collaboration with PaddlePaddle community and vendors for timely patch releases and security advisories is also recommended.
Affected Countries
For access to advanced analysis and higher rate limits, contact root@offseq.com
Technical Details
- Data Version
- 5.1
- Assigner Short Name
- Baidu
- Date Reserved
- 2023-07-24T07:55:02.091Z
- Cisa Enriched
- true
- Cvss Version
- 3.1
- State
- PUBLISHED
Threat ID: 682dec48c4522896dcc00a7a
Added to database: 5/21/2025, 3:07:52 PM
Last enriched: 7/7/2025, 2:55:33 PM
Last updated: 10/16/2025, 7:52:52 AM
Views: 22
Community Reviews
0 reviewsCrowdsource mitigation strategies, share intel context, and vote on the most helpful responses. Sign in to add your voice and help keep defenders ahead.
Want to contribute mitigation steps or threat intel context? Sign in or create an account to join the community discussion.
Related Threats
CVE-2025-55090: CWE-125 Out-of-bounds Read in Eclipse Foundation NetX Duo
MediumCVE-2025-62585: CWE-358 Improperly Implemented Security Check for Standard in NAVER NAVER Whale browser
UnknownCVE-2025-62584: CWE-346 Origin Validation Error in NAVER NAVER Whale browser
UnknownCVE-2025-62583: CWE-358 Improperly Implemented Security Check for Standard in NAVER NAVER Whale browser
UnknownCVE-2025-10850: CWE-798 Use of Hard-coded Credentials in RiceTheme Felan Framework
CriticalActions
Updates to AI analysis require Pro Console access. Upgrade inside Console → Billing.
External Links
Need enhanced features?
Contact root@offseq.com for Pro access with improved analysis and higher rate limits.