Skip to main content

CVE-2023-52306: CWE-369 Divide By Zero in PaddlePaddle PaddlePaddle

Medium
VulnerabilityCVE-2023-52306cvecve-2023-52306cwe-369
Published: Wed Jan 03 2024 (01/03/2024, 08:13:52 UTC)
Source: CVE Database V5
Vendor/Project: PaddlePaddle
Product: PaddlePaddle

Description

FPE in paddle.lerp in PaddlePaddle before 2.6.0. This flaw can cause a runtime crash and a denial of service.

AI-Powered Analysis

AILast updated: 07/04/2025, 02:26:39 UTC

Technical Analysis

CVE-2023-52306 is a medium-severity vulnerability identified in PaddlePaddle, an open-source deep learning platform developed by Baidu. The flaw is categorized under CWE-369 (Divide By Zero) and specifically affects the function paddle.lerp in PaddlePaddle versions prior to 2.6.0. The vulnerability manifests as a floating-point exception (FPE) that occurs when the lerp (linear interpolation) function encounters a divide-by-zero condition. This flaw can cause the affected application to crash at runtime, leading to a denial of service (DoS) condition. The CVSS v3.1 base score is 4.7, reflecting a network attack vector (AV:N), low attack complexity (AC:L), no privileges required (PR:N), but requiring user interaction (UI:R). The scope is changed (S:C), meaning the vulnerability affects resources beyond the vulnerable component. The impact is limited to availability (A:L) with no confidentiality or integrity impact. No known exploits are currently reported in the wild, and no official patches have been linked yet. The vulnerability could be triggered remotely by an attacker who can induce a user to invoke the vulnerable lerp function with crafted inputs that cause a divide-by-zero error. This would result in a crash of the PaddlePaddle process, disrupting machine learning workflows or services relying on this platform. Given PaddlePaddle's role in AI model training and inference, such a DoS could impact availability of AI-powered applications or services.

Potential Impact

For European organizations leveraging PaddlePaddle for AI and machine learning workloads, this vulnerability poses a risk of service disruption. Organizations using PaddlePaddle in production environments—especially those providing AI-driven services or critical analytics—may experience downtime or degraded service availability if exploited. This could affect sectors such as finance, healthcare, manufacturing, and research institutions that rely on AI models for decision-making or operational automation. Although the vulnerability does not compromise data confidentiality or integrity, the denial of service could interrupt business processes, delay analytics, or degrade user experience. The requirement for user interaction to trigger the flaw somewhat limits the attack surface, but in environments where PaddlePaddle is exposed to untrusted inputs or users, the risk remains significant. Additionally, the changed scope indicates that the impact could extend beyond the immediate process, potentially affecting other components or services dependent on PaddlePaddle. The absence of known exploits reduces immediate risk, but organizations should remain vigilant given the increasing adoption of AI frameworks in Europe.

Mitigation Recommendations

European organizations should prioritize upgrading PaddlePaddle to version 2.6.0 or later, where this vulnerability is addressed. Until an official patch is available, organizations should implement input validation and sanitization to prevent inputs that could cause divide-by-zero conditions in the paddle.lerp function. Restricting access to PaddlePaddle services to trusted users and networks can reduce exposure, as exploitation requires user interaction. Monitoring application logs for crashes or abnormal terminations related to paddle.lerp can help detect attempted exploitation. Employing runtime protections such as sandboxing PaddlePaddle processes or using containerization can limit the impact of crashes. Additionally, organizations should review their AI workflows to identify any external inputs feeding into PaddlePaddle and apply strict validation controls. Incident response plans should include procedures for rapid recovery from service disruptions caused by this vulnerability. Finally, maintaining awareness of vendor updates and applying patches promptly once released is critical to long-term mitigation.

Need more detailed analysis?Get Pro

Technical Details

Data Version
5.1
Assigner Short Name
Baidu
Date Reserved
2024-01-02T05:32:46.253Z
Cvss Version
3.1
State
PUBLISHED

Threat ID: 683f0dc2182aa0cae27ff3cf

Added to database: 6/3/2025, 2:59:14 PM

Last enriched: 7/4/2025, 2:26:39 AM

Last updated: 8/11/2025, 5:55:24 PM

Views: 10

Actions

PRO

Updates to AI analysis are available only with a Pro account. Contact root@offseq.com for access.

Please log in to the Console to use AI analysis features.

Need enhanced features?

Contact root@offseq.com for Pro access with improved analysis and higher rate limits.

Latest Threats