CVE-2023-52306: CWE-369 Divide By Zero in PaddlePaddle PaddlePaddle
FPE in paddle.lerp in PaddlePaddle before 2.6.0. This flaw can cause a runtime crash and a denial of service.
AI Analysis
Technical Summary
CVE-2023-52306 is a medium-severity vulnerability identified in PaddlePaddle, an open-source deep learning platform developed by Baidu. The flaw is categorized under CWE-369 (Divide By Zero) and specifically affects the function paddle.lerp in PaddlePaddle versions prior to 2.6.0. The vulnerability manifests as a floating-point exception (FPE) that occurs when the lerp (linear interpolation) function encounters a divide-by-zero condition. This flaw can cause the affected application to crash at runtime, leading to a denial of service (DoS) condition. The CVSS v3.1 base score is 4.7, reflecting a network attack vector (AV:N), low attack complexity (AC:L), no privileges required (PR:N), but requiring user interaction (UI:R). The scope is changed (S:C), meaning the vulnerability affects resources beyond the vulnerable component. The impact is limited to availability (A:L) with no confidentiality or integrity impact. No known exploits are currently reported in the wild, and no official patches have been linked yet. The vulnerability could be triggered remotely by an attacker who can induce a user to invoke the vulnerable lerp function with crafted inputs that cause a divide-by-zero error. This would result in a crash of the PaddlePaddle process, disrupting machine learning workflows or services relying on this platform. Given PaddlePaddle's role in AI model training and inference, such a DoS could impact availability of AI-powered applications or services.
Potential Impact
For European organizations leveraging PaddlePaddle for AI and machine learning workloads, this vulnerability poses a risk of service disruption. Organizations using PaddlePaddle in production environments—especially those providing AI-driven services or critical analytics—may experience downtime or degraded service availability if exploited. This could affect sectors such as finance, healthcare, manufacturing, and research institutions that rely on AI models for decision-making or operational automation. Although the vulnerability does not compromise data confidentiality or integrity, the denial of service could interrupt business processes, delay analytics, or degrade user experience. The requirement for user interaction to trigger the flaw somewhat limits the attack surface, but in environments where PaddlePaddle is exposed to untrusted inputs or users, the risk remains significant. Additionally, the changed scope indicates that the impact could extend beyond the immediate process, potentially affecting other components or services dependent on PaddlePaddle. The absence of known exploits reduces immediate risk, but organizations should remain vigilant given the increasing adoption of AI frameworks in Europe.
Mitigation Recommendations
European organizations should prioritize upgrading PaddlePaddle to version 2.6.0 or later, where this vulnerability is addressed. Until an official patch is available, organizations should implement input validation and sanitization to prevent inputs that could cause divide-by-zero conditions in the paddle.lerp function. Restricting access to PaddlePaddle services to trusted users and networks can reduce exposure, as exploitation requires user interaction. Monitoring application logs for crashes or abnormal terminations related to paddle.lerp can help detect attempted exploitation. Employing runtime protections such as sandboxing PaddlePaddle processes or using containerization can limit the impact of crashes. Additionally, organizations should review their AI workflows to identify any external inputs feeding into PaddlePaddle and apply strict validation controls. Incident response plans should include procedures for rapid recovery from service disruptions caused by this vulnerability. Finally, maintaining awareness of vendor updates and applying patches promptly once released is critical to long-term mitigation.
Affected Countries
Germany, France, United Kingdom, Netherlands, Sweden, Finland
CVE-2023-52306: CWE-369 Divide By Zero in PaddlePaddle PaddlePaddle
Description
FPE in paddle.lerp in PaddlePaddle before 2.6.0. This flaw can cause a runtime crash and a denial of service.
AI-Powered Analysis
Technical Analysis
CVE-2023-52306 is a medium-severity vulnerability identified in PaddlePaddle, an open-source deep learning platform developed by Baidu. The flaw is categorized under CWE-369 (Divide By Zero) and specifically affects the function paddle.lerp in PaddlePaddle versions prior to 2.6.0. The vulnerability manifests as a floating-point exception (FPE) that occurs when the lerp (linear interpolation) function encounters a divide-by-zero condition. This flaw can cause the affected application to crash at runtime, leading to a denial of service (DoS) condition. The CVSS v3.1 base score is 4.7, reflecting a network attack vector (AV:N), low attack complexity (AC:L), no privileges required (PR:N), but requiring user interaction (UI:R). The scope is changed (S:C), meaning the vulnerability affects resources beyond the vulnerable component. The impact is limited to availability (A:L) with no confidentiality or integrity impact. No known exploits are currently reported in the wild, and no official patches have been linked yet. The vulnerability could be triggered remotely by an attacker who can induce a user to invoke the vulnerable lerp function with crafted inputs that cause a divide-by-zero error. This would result in a crash of the PaddlePaddle process, disrupting machine learning workflows or services relying on this platform. Given PaddlePaddle's role in AI model training and inference, such a DoS could impact availability of AI-powered applications or services.
Potential Impact
For European organizations leveraging PaddlePaddle for AI and machine learning workloads, this vulnerability poses a risk of service disruption. Organizations using PaddlePaddle in production environments—especially those providing AI-driven services or critical analytics—may experience downtime or degraded service availability if exploited. This could affect sectors such as finance, healthcare, manufacturing, and research institutions that rely on AI models for decision-making or operational automation. Although the vulnerability does not compromise data confidentiality or integrity, the denial of service could interrupt business processes, delay analytics, or degrade user experience. The requirement for user interaction to trigger the flaw somewhat limits the attack surface, but in environments where PaddlePaddle is exposed to untrusted inputs or users, the risk remains significant. Additionally, the changed scope indicates that the impact could extend beyond the immediate process, potentially affecting other components or services dependent on PaddlePaddle. The absence of known exploits reduces immediate risk, but organizations should remain vigilant given the increasing adoption of AI frameworks in Europe.
Mitigation Recommendations
European organizations should prioritize upgrading PaddlePaddle to version 2.6.0 or later, where this vulnerability is addressed. Until an official patch is available, organizations should implement input validation and sanitization to prevent inputs that could cause divide-by-zero conditions in the paddle.lerp function. Restricting access to PaddlePaddle services to trusted users and networks can reduce exposure, as exploitation requires user interaction. Monitoring application logs for crashes or abnormal terminations related to paddle.lerp can help detect attempted exploitation. Employing runtime protections such as sandboxing PaddlePaddle processes or using containerization can limit the impact of crashes. Additionally, organizations should review their AI workflows to identify any external inputs feeding into PaddlePaddle and apply strict validation controls. Incident response plans should include procedures for rapid recovery from service disruptions caused by this vulnerability. Finally, maintaining awareness of vendor updates and applying patches promptly once released is critical to long-term mitigation.
Affected Countries
For access to advanced analysis and higher rate limits, contact root@offseq.com
Technical Details
- Data Version
- 5.1
- Assigner Short Name
- Baidu
- Date Reserved
- 2024-01-02T05:32:46.253Z
- Cvss Version
- 3.1
- State
- PUBLISHED
Threat ID: 683f0dc2182aa0cae27ff3cf
Added to database: 6/3/2025, 2:59:14 PM
Last enriched: 7/4/2025, 2:26:39 AM
Last updated: 8/11/2025, 5:55:24 PM
Views: 10
Related Threats
CVE-2025-8938: Backdoor in TOTOLINK N350R
MediumCVE-2025-8937: Command Injection in TOTOLINK N350R
MediumCVE-2025-8936: SQL Injection in 1000 Projects Sales Management System
MediumCVE-2025-5942: CWE-122 Heap-based Buffer Overflow in Netskope Netskope Client
MediumCVE-2025-5941: CWE-125 Out-of-Bounds Read in Netskope Netskope Client
LowActions
Updates to AI analysis are available only with a Pro account. Contact root@offseq.com for access.
External Links
Need enhanced features?
Contact root@offseq.com for Pro access with improved analysis and higher rate limits.