CVE-2023-52305: CWE-369 Divide By Zero in PaddlePaddle PaddlePaddle
FPE in paddle.topk in PaddlePaddle before 2.6.0. This flaw can cause a runtime crash and a denial of service.
AI Analysis
Technical Summary
CVE-2023-52305 is a vulnerability identified in the PaddlePaddle deep learning platform, specifically affecting versions prior to 2.6.0. The flaw is categorized under CWE-369, which corresponds to a divide-by-zero error. The vulnerability arises in the paddle.topk function, a commonly used operation in machine learning workflows that selects the top K elements from a tensor. Due to improper handling of input values or internal calculations, the function can trigger a floating-point exception (FPE) caused by division by zero. This results in a runtime crash of the PaddlePaddle process, leading to denial of service (DoS). The vulnerability does not impact confidentiality or integrity but affects availability by causing the application to terminate unexpectedly. Exploitation requires no privileges (AV:N - network vector), no authentication (PR:N), but does require user interaction (UI:R), such as submitting crafted input data to the vulnerable function. The scope is changed (S:C), meaning the impact can extend beyond the vulnerable component, potentially affecting the entire application or system using PaddlePaddle. The CVSS v3.1 base score is 4.7, indicating a medium severity level. No known exploits are currently reported in the wild, and no official patches have been linked yet. The vulnerability was published on January 3, 2024, with Baidu as the assigner. Given the widespread use of PaddlePaddle in AI and machine learning applications, especially in research and production environments, this vulnerability could disrupt services relying on this framework if exploited.
Potential Impact
For European organizations, the primary impact of CVE-2023-52305 is the potential disruption of AI and machine learning services that utilize PaddlePaddle. This could affect sectors such as finance, healthcare, automotive, and research institutions that rely on AI models for critical decision-making, data analysis, or automation. A denial of service caused by this vulnerability could lead to downtime, loss of productivity, and delays in AI-driven processes. Although the vulnerability does not compromise data confidentiality or integrity, the availability impact could indirectly affect business operations and service level agreements. Organizations deploying PaddlePaddle in cloud environments or exposed to external users submitting data to AI models are at higher risk. Additionally, AI service providers and SaaS platforms offering machine learning capabilities may face customer dissatisfaction or reputational damage if services are interrupted. The medium severity rating suggests that while the threat is not critical, it requires timely attention to prevent operational issues.
Mitigation Recommendations
European organizations should take the following specific actions to mitigate this vulnerability: 1) Identify all instances of PaddlePaddle in their environments, including development, testing, and production systems. 2) Upgrade PaddlePaddle to version 2.6.0 or later once the patch is officially released, as this version addresses the divide-by-zero flaw. 3) Until patches are available, implement input validation and sanitization on data fed into the paddle.topk function to prevent triggering the divide-by-zero condition. 4) Employ runtime monitoring and anomaly detection to quickly identify crashes or abnormal terminations of AI services using PaddlePaddle. 5) Restrict access to AI model endpoints to trusted users and networks to reduce the risk of malicious or malformed input causing denial of service. 6) Incorporate fallback mechanisms in AI workflows to maintain service continuity if PaddlePaddle components fail. 7) Engage with PaddlePaddle community and vendor channels for updates and advisories. 8) Conduct security testing and fuzzing on AI model inputs to uncover similar vulnerabilities proactively.
Affected Countries
Germany, France, United Kingdom, Netherlands, Sweden, Finland
CVE-2023-52305: CWE-369 Divide By Zero in PaddlePaddle PaddlePaddle
Description
FPE in paddle.topk in PaddlePaddle before 2.6.0. This flaw can cause a runtime crash and a denial of service.
AI-Powered Analysis
Technical Analysis
CVE-2023-52305 is a vulnerability identified in the PaddlePaddle deep learning platform, specifically affecting versions prior to 2.6.0. The flaw is categorized under CWE-369, which corresponds to a divide-by-zero error. The vulnerability arises in the paddle.topk function, a commonly used operation in machine learning workflows that selects the top K elements from a tensor. Due to improper handling of input values or internal calculations, the function can trigger a floating-point exception (FPE) caused by division by zero. This results in a runtime crash of the PaddlePaddle process, leading to denial of service (DoS). The vulnerability does not impact confidentiality or integrity but affects availability by causing the application to terminate unexpectedly. Exploitation requires no privileges (AV:N - network vector), no authentication (PR:N), but does require user interaction (UI:R), such as submitting crafted input data to the vulnerable function. The scope is changed (S:C), meaning the impact can extend beyond the vulnerable component, potentially affecting the entire application or system using PaddlePaddle. The CVSS v3.1 base score is 4.7, indicating a medium severity level. No known exploits are currently reported in the wild, and no official patches have been linked yet. The vulnerability was published on January 3, 2024, with Baidu as the assigner. Given the widespread use of PaddlePaddle in AI and machine learning applications, especially in research and production environments, this vulnerability could disrupt services relying on this framework if exploited.
Potential Impact
For European organizations, the primary impact of CVE-2023-52305 is the potential disruption of AI and machine learning services that utilize PaddlePaddle. This could affect sectors such as finance, healthcare, automotive, and research institutions that rely on AI models for critical decision-making, data analysis, or automation. A denial of service caused by this vulnerability could lead to downtime, loss of productivity, and delays in AI-driven processes. Although the vulnerability does not compromise data confidentiality or integrity, the availability impact could indirectly affect business operations and service level agreements. Organizations deploying PaddlePaddle in cloud environments or exposed to external users submitting data to AI models are at higher risk. Additionally, AI service providers and SaaS platforms offering machine learning capabilities may face customer dissatisfaction or reputational damage if services are interrupted. The medium severity rating suggests that while the threat is not critical, it requires timely attention to prevent operational issues.
Mitigation Recommendations
European organizations should take the following specific actions to mitigate this vulnerability: 1) Identify all instances of PaddlePaddle in their environments, including development, testing, and production systems. 2) Upgrade PaddlePaddle to version 2.6.0 or later once the patch is officially released, as this version addresses the divide-by-zero flaw. 3) Until patches are available, implement input validation and sanitization on data fed into the paddle.topk function to prevent triggering the divide-by-zero condition. 4) Employ runtime monitoring and anomaly detection to quickly identify crashes or abnormal terminations of AI services using PaddlePaddle. 5) Restrict access to AI model endpoints to trusted users and networks to reduce the risk of malicious or malformed input causing denial of service. 6) Incorporate fallback mechanisms in AI workflows to maintain service continuity if PaddlePaddle components fail. 7) Engage with PaddlePaddle community and vendor channels for updates and advisories. 8) Conduct security testing and fuzzing on AI model inputs to uncover similar vulnerabilities proactively.
Affected Countries
For access to advanced analysis and higher rate limits, contact root@offseq.com
Technical Details
- Data Version
- 5.1
- Assigner Short Name
- Baidu
- Date Reserved
- 2024-01-02T05:32:46.253Z
- Cvss Version
- 3.1
- State
- PUBLISHED
Threat ID: 683f0dc2182aa0cae27ff3cd
Added to database: 6/3/2025, 2:59:14 PM
Last enriched: 7/4/2025, 2:56:26 AM
Last updated: 7/31/2025, 11:34:01 AM
Views: 15
Related Threats
Carmaker’s Portal Vulnerability Could Have Allowed Hackers to Unlock Vehicles and Access Data
MediumCVE-2025-8285: CWE-862: Missing Authorization in Mattermost Mattermost Confluence Plugin
MediumCVE-2025-54525: CWE-1287: Improper Validation of Specified Type of Input in Mattermost Mattermost Confluence Plugin
HighCVE-2025-54478: CWE-306: Missing Authentication for Critical Function in Mattermost Mattermost Confluence Plugin
HighCVE-2025-54463: CWE-754: Improper Check for Unusual or Exceptional Conditions in Mattermost Mattermost Confluence Plugin
MediumActions
Updates to AI analysis are available only with a Pro account. Contact root@offseq.com for access.
External Links
Need enhanced features?
Contact root@offseq.com for Pro access with improved analysis and higher rate limits.