Skip to main content

CVE-2023-52305: CWE-369 Divide By Zero in PaddlePaddle PaddlePaddle

Medium
VulnerabilityCVE-2023-52305cvecve-2023-52305cwe-369
Published: Wed Jan 03 2024 (01/03/2024, 08:13:26 UTC)
Source: CVE Database V5
Vendor/Project: PaddlePaddle
Product: PaddlePaddle

Description

FPE in paddle.topk in PaddlePaddle before 2.6.0. This flaw can cause a runtime crash and a denial of service.

AI-Powered Analysis

AILast updated: 07/04/2025, 02:56:26 UTC

Technical Analysis

CVE-2023-52305 is a vulnerability identified in the PaddlePaddle deep learning platform, specifically affecting versions prior to 2.6.0. The flaw is categorized under CWE-369, which corresponds to a divide-by-zero error. The vulnerability arises in the paddle.topk function, a commonly used operation in machine learning workflows that selects the top K elements from a tensor. Due to improper handling of input values or internal calculations, the function can trigger a floating-point exception (FPE) caused by division by zero. This results in a runtime crash of the PaddlePaddle process, leading to denial of service (DoS). The vulnerability does not impact confidentiality or integrity but affects availability by causing the application to terminate unexpectedly. Exploitation requires no privileges (AV:N - network vector), no authentication (PR:N), but does require user interaction (UI:R), such as submitting crafted input data to the vulnerable function. The scope is changed (S:C), meaning the impact can extend beyond the vulnerable component, potentially affecting the entire application or system using PaddlePaddle. The CVSS v3.1 base score is 4.7, indicating a medium severity level. No known exploits are currently reported in the wild, and no official patches have been linked yet. The vulnerability was published on January 3, 2024, with Baidu as the assigner. Given the widespread use of PaddlePaddle in AI and machine learning applications, especially in research and production environments, this vulnerability could disrupt services relying on this framework if exploited.

Potential Impact

For European organizations, the primary impact of CVE-2023-52305 is the potential disruption of AI and machine learning services that utilize PaddlePaddle. This could affect sectors such as finance, healthcare, automotive, and research institutions that rely on AI models for critical decision-making, data analysis, or automation. A denial of service caused by this vulnerability could lead to downtime, loss of productivity, and delays in AI-driven processes. Although the vulnerability does not compromise data confidentiality or integrity, the availability impact could indirectly affect business operations and service level agreements. Organizations deploying PaddlePaddle in cloud environments or exposed to external users submitting data to AI models are at higher risk. Additionally, AI service providers and SaaS platforms offering machine learning capabilities may face customer dissatisfaction or reputational damage if services are interrupted. The medium severity rating suggests that while the threat is not critical, it requires timely attention to prevent operational issues.

Mitigation Recommendations

European organizations should take the following specific actions to mitigate this vulnerability: 1) Identify all instances of PaddlePaddle in their environments, including development, testing, and production systems. 2) Upgrade PaddlePaddle to version 2.6.0 or later once the patch is officially released, as this version addresses the divide-by-zero flaw. 3) Until patches are available, implement input validation and sanitization on data fed into the paddle.topk function to prevent triggering the divide-by-zero condition. 4) Employ runtime monitoring and anomaly detection to quickly identify crashes or abnormal terminations of AI services using PaddlePaddle. 5) Restrict access to AI model endpoints to trusted users and networks to reduce the risk of malicious or malformed input causing denial of service. 6) Incorporate fallback mechanisms in AI workflows to maintain service continuity if PaddlePaddle components fail. 7) Engage with PaddlePaddle community and vendor channels for updates and advisories. 8) Conduct security testing and fuzzing on AI model inputs to uncover similar vulnerabilities proactively.

Need more detailed analysis?Get Pro

Technical Details

Data Version
5.1
Assigner Short Name
Baidu
Date Reserved
2024-01-02T05:32:46.253Z
Cvss Version
3.1
State
PUBLISHED

Threat ID: 683f0dc2182aa0cae27ff3cd

Added to database: 6/3/2025, 2:59:14 PM

Last enriched: 7/4/2025, 2:56:26 AM

Last updated: 7/31/2025, 11:34:01 AM

Views: 15

Actions

PRO

Updates to AI analysis are available only with a Pro account. Contact root@offseq.com for access.

Please log in to the Console to use AI analysis features.

Need enhanced features?

Contact root@offseq.com for Pro access with improved analysis and higher rate limits.

Latest Threats