CVE-2023-52305: CWE-369 Divide By Zero in PaddlePaddle PaddlePaddle
FPE in paddle.topk in PaddlePaddle before 2.6.0. This flaw can cause a runtime crash and a denial of service.
AI Analysis
Technical Summary
CVE-2023-52305 is a vulnerability identified in the PaddlePaddle deep learning platform, specifically affecting versions prior to 2.6.0. The flaw is categorized under CWE-369, which corresponds to a divide-by-zero error. The vulnerability arises in the paddle.topk function, a commonly used operation in machine learning workflows that selects the top K elements from a tensor. Due to improper handling of input values or internal calculations, the function can trigger a floating-point exception (FPE) caused by division by zero. This results in a runtime crash of the PaddlePaddle process, leading to denial of service (DoS). The vulnerability does not impact confidentiality or integrity but affects availability by causing the application to terminate unexpectedly. Exploitation requires no privileges (AV:N - network vector), no authentication (PR:N), but does require user interaction (UI:R), such as submitting crafted input data to the vulnerable function. The scope is changed (S:C), meaning the impact can extend beyond the vulnerable component, potentially affecting the entire application or system using PaddlePaddle. The CVSS v3.1 base score is 4.7, indicating a medium severity level. No known exploits are currently reported in the wild, and no official patches have been linked yet. The vulnerability was published on January 3, 2024, with Baidu as the assigner. Given the widespread use of PaddlePaddle in AI and machine learning applications, especially in research and production environments, this vulnerability could disrupt services relying on this framework if exploited.
Potential Impact
For European organizations, the primary impact of CVE-2023-52305 is the potential disruption of AI and machine learning services that utilize PaddlePaddle. This could affect sectors such as finance, healthcare, automotive, and research institutions that rely on AI models for critical decision-making, data analysis, or automation. A denial of service caused by this vulnerability could lead to downtime, loss of productivity, and delays in AI-driven processes. Although the vulnerability does not compromise data confidentiality or integrity, the availability impact could indirectly affect business operations and service level agreements. Organizations deploying PaddlePaddle in cloud environments or exposed to external users submitting data to AI models are at higher risk. Additionally, AI service providers and SaaS platforms offering machine learning capabilities may face customer dissatisfaction or reputational damage if services are interrupted. The medium severity rating suggests that while the threat is not critical, it requires timely attention to prevent operational issues.
Mitigation Recommendations
European organizations should take the following specific actions to mitigate this vulnerability: 1) Identify all instances of PaddlePaddle in their environments, including development, testing, and production systems. 2) Upgrade PaddlePaddle to version 2.6.0 or later once the patch is officially released, as this version addresses the divide-by-zero flaw. 3) Until patches are available, implement input validation and sanitization on data fed into the paddle.topk function to prevent triggering the divide-by-zero condition. 4) Employ runtime monitoring and anomaly detection to quickly identify crashes or abnormal terminations of AI services using PaddlePaddle. 5) Restrict access to AI model endpoints to trusted users and networks to reduce the risk of malicious or malformed input causing denial of service. 6) Incorporate fallback mechanisms in AI workflows to maintain service continuity if PaddlePaddle components fail. 7) Engage with PaddlePaddle community and vendor channels for updates and advisories. 8) Conduct security testing and fuzzing on AI model inputs to uncover similar vulnerabilities proactively.
Affected Countries
Germany, France, United Kingdom, Netherlands, Sweden, Finland
CVE-2023-52305: CWE-369 Divide By Zero in PaddlePaddle PaddlePaddle
Description
FPE in paddle.topk in PaddlePaddle before 2.6.0. This flaw can cause a runtime crash and a denial of service.
AI-Powered Analysis
Technical Analysis
CVE-2023-52305 is a vulnerability identified in the PaddlePaddle deep learning platform, specifically affecting versions prior to 2.6.0. The flaw is categorized under CWE-369, which corresponds to a divide-by-zero error. The vulnerability arises in the paddle.topk function, a commonly used operation in machine learning workflows that selects the top K elements from a tensor. Due to improper handling of input values or internal calculations, the function can trigger a floating-point exception (FPE) caused by division by zero. This results in a runtime crash of the PaddlePaddle process, leading to denial of service (DoS). The vulnerability does not impact confidentiality or integrity but affects availability by causing the application to terminate unexpectedly. Exploitation requires no privileges (AV:N - network vector), no authentication (PR:N), but does require user interaction (UI:R), such as submitting crafted input data to the vulnerable function. The scope is changed (S:C), meaning the impact can extend beyond the vulnerable component, potentially affecting the entire application or system using PaddlePaddle. The CVSS v3.1 base score is 4.7, indicating a medium severity level. No known exploits are currently reported in the wild, and no official patches have been linked yet. The vulnerability was published on January 3, 2024, with Baidu as the assigner. Given the widespread use of PaddlePaddle in AI and machine learning applications, especially in research and production environments, this vulnerability could disrupt services relying on this framework if exploited.
Potential Impact
For European organizations, the primary impact of CVE-2023-52305 is the potential disruption of AI and machine learning services that utilize PaddlePaddle. This could affect sectors such as finance, healthcare, automotive, and research institutions that rely on AI models for critical decision-making, data analysis, or automation. A denial of service caused by this vulnerability could lead to downtime, loss of productivity, and delays in AI-driven processes. Although the vulnerability does not compromise data confidentiality or integrity, the availability impact could indirectly affect business operations and service level agreements. Organizations deploying PaddlePaddle in cloud environments or exposed to external users submitting data to AI models are at higher risk. Additionally, AI service providers and SaaS platforms offering machine learning capabilities may face customer dissatisfaction or reputational damage if services are interrupted. The medium severity rating suggests that while the threat is not critical, it requires timely attention to prevent operational issues.
Mitigation Recommendations
European organizations should take the following specific actions to mitigate this vulnerability: 1) Identify all instances of PaddlePaddle in their environments, including development, testing, and production systems. 2) Upgrade PaddlePaddle to version 2.6.0 or later once the patch is officially released, as this version addresses the divide-by-zero flaw. 3) Until patches are available, implement input validation and sanitization on data fed into the paddle.topk function to prevent triggering the divide-by-zero condition. 4) Employ runtime monitoring and anomaly detection to quickly identify crashes or abnormal terminations of AI services using PaddlePaddle. 5) Restrict access to AI model endpoints to trusted users and networks to reduce the risk of malicious or malformed input causing denial of service. 6) Incorporate fallback mechanisms in AI workflows to maintain service continuity if PaddlePaddle components fail. 7) Engage with PaddlePaddle community and vendor channels for updates and advisories. 8) Conduct security testing and fuzzing on AI model inputs to uncover similar vulnerabilities proactively.
Affected Countries
For access to advanced analysis and higher rate limits, contact root@offseq.com
Technical Details
- Data Version
- 5.1
- Assigner Short Name
- Baidu
- Date Reserved
- 2024-01-02T05:32:46.253Z
- Cvss Version
- 3.1
- State
- PUBLISHED
Threat ID: 683f0dc2182aa0cae27ff3cd
Added to database: 6/3/2025, 2:59:14 PM
Last enriched: 7/4/2025, 2:56:26 AM
Last updated: 12/1/2025, 4:31:07 PM
Views: 37
Community Reviews
0 reviewsCrowdsource mitigation strategies, share intel context, and vote on the most helpful responses. Sign in to add your voice and help keep defenders ahead.
Want to contribute mitigation steps or threat intel context? Sign in or create an account to join the community discussion.
Related Threats
CVE-2025-65405: n/a
UnknownCVE-2025-65404: n/a
UnknownCVE-2025-65403: n/a
UnknownCVE-2025-64775: CWE-459 Incomplete Cleanup in Apache Software Foundation Apache Struts
UnknownCVE-2025-3500: CWE-190 Integer Overflow or Wraparound in Avast Antivirus
CriticalActions
Updates to AI analysis require Pro Console access. Upgrade inside Console → Billing.
External Links
Need enhanced features?
Contact root@offseq.com for Pro access with improved analysis and higher rate limits.