Skip to main content

CVE-2023-52308: CWE-369 Divide By Zero in PaddlePaddle PaddlePaddle

Medium
VulnerabilityCVE-2023-52308cvecve-2023-52308cwe-369
Published: Wed Jan 03 2024 (01/03/2024, 08:14:13 UTC)
Source: CVE
Vendor/Project: PaddlePaddle
Product: PaddlePaddle

Description

FPE in paddle.amin in PaddlePaddle before 2.6.0. This flaw can cause a runtime crash and a denial of service.

AI-Powered Analysis

AILast updated: 07/04/2025, 23:56:45 UTC

Technical Analysis

CVE-2023-52308 is a medium-severity vulnerability identified in PaddlePaddle, an open-source deep learning platform developed by Baidu. The flaw is classified under CWE-369 (Divide By Zero) and specifically affects the function paddle.amin in PaddlePaddle versions prior to 2.6.0. This vulnerability manifests as a floating point exception (FPE) caused by a divide-by-zero error during runtime. When triggered, it leads to a runtime crash of the affected application, resulting in a denial of service (DoS) condition. The vulnerability does not impact confidentiality or integrity but affects availability by causing the application to terminate unexpectedly. The CVSS v3.1 base score is 4.7 (medium), with the vector indicating network attack vector (AV:N), low attack complexity (AC:L), no privileges required (PR:N), user interaction required (UI:R), scope changed (S:C), no confidentiality or integrity impact (C:N/I:N), and low availability impact (A:L). No known exploits are currently reported in the wild, and no official patches or mitigations have been linked yet. The vulnerability requires user interaction to be exploited, which may involve supplying crafted inputs to the paddle.amin function that trigger the divide-by-zero condition. This flaw can affect any system running vulnerable versions of PaddlePaddle, particularly those using the paddle.amin function in their machine learning workflows.

Potential Impact

For European organizations leveraging PaddlePaddle in AI and machine learning applications, this vulnerability poses a risk primarily to service availability. Systems performing critical AI computations or real-time inference using vulnerable PaddlePaddle versions may experience unexpected crashes, disrupting business operations, data processing pipelines, or AI-driven services. This can impact sectors such as finance, healthcare, manufacturing, and research institutions that rely on stable AI platforms. Although the vulnerability does not compromise data confidentiality or integrity, denial of service conditions can lead to operational downtime, loss of productivity, and potential financial losses. Organizations with automated or large-scale AI deployments are particularly at risk if the flaw is triggered by malicious or malformed inputs, especially in environments where user interaction or external data feeds are involved. The requirement for user interaction reduces the risk of widespread automated exploitation but does not eliminate targeted attacks or accidental triggers. Given the growing adoption of AI platforms in Europe, the vulnerability could affect critical infrastructure and services if not addressed promptly.

Mitigation Recommendations

European organizations should take the following specific steps to mitigate this vulnerability: 1) Immediately identify and inventory all systems running PaddlePaddle, especially versions prior to 2.6.0. 2) Where possible, upgrade PaddlePaddle to version 2.6.0 or later once an official patch is released to eliminate the divide-by-zero flaw. 3) Until patches are available, implement input validation and sanitization on all data fed into paddle.amin to prevent zero or invalid values that could trigger the divide-by-zero error. 4) Employ runtime monitoring and anomaly detection to identify crashes or unusual application behavior indicative of exploitation attempts. 5) Restrict access to AI model endpoints and limit user inputs to trusted sources to reduce the likelihood of maliciously crafted inputs causing denial of service. 6) Incorporate robust error handling in AI workflows to gracefully manage exceptions and prevent full application crashes. 7) Maintain up-to-date backups and disaster recovery plans to minimize operational impact in case of service disruption. 8) Engage with the PaddlePaddle community and Baidu for timely updates and patches. These targeted mitigations go beyond generic advice by focusing on input control, monitoring, and operational resilience specific to the nature of this divide-by-zero vulnerability.

Need more detailed analysis?Get Pro

Technical Details

Data Version
5.1
Assigner Short Name
Baidu
Date Reserved
2024-01-02T05:32:46.254Z
Cisa Enriched
true
Cvss Version
3.1
State
PUBLISHED

Threat ID: 682d9817c4522896dcbd742b

Added to database: 5/21/2025, 9:08:39 AM

Last enriched: 7/4/2025, 11:56:45 PM

Last updated: 7/26/2025, 12:48:05 PM

Views: 13

Actions

PRO

Updates to AI analysis are available only with a Pro account. Contact root@offseq.com for access.

Please log in to the Console to use AI analysis features.

Need enhanced features?

Contact root@offseq.com for Pro access with improved analysis and higher rate limits.

Latest Threats