CVE-2021-37681
Python vulnerability analysis and mitigation

Overview

TensorFlow, an end-to-end open source platform for machine learning, was found to contain a null pointer vulnerability in its TFLite SVDF implementation. The vulnerability, identified as CVE-2021-37681, was discovered and reported by members of the Aivul Team from Qihoo 360. The issue affects versions prior to 2.6.0, with patched versions including 2.3.4, 2.4.3, and 2.5.1 (GitHub Advisory).

Technical details

The vulnerability stems from the GetVariableInput function in TFLite's SVDF implementation, which can return a null pointer. However, the GetTensorData function assumes that its argument is always a valid tensor. Additionally, since GetVariableInput calls GetMutableInput which might return nullptr, the tensor->is_variable expression can trigger a null pointer exception. This implementation flaw could lead to application crashes and potential denial of service (GitHub Advisory).

Impact

The vulnerability could result in null pointer exceptions leading to application crashes and potential denial of service in systems using the affected versions of TensorFlow (GitHub Advisory).

Mitigation and workarounds

The issue was patched in GitHub commit 5b048e87e4e55990dae6b547add4dae59f4e1c76 and included in TensorFlow 2.6.0. The fix was also backported to versions 2.5.1, 2.4.3, and 2.3.4. Users are recommended to upgrade to these patched versions to address the vulnerability (GitHub Advisory).

Additional resources


SourceThis report was generated using AI

Related Python vulnerabilities:

CVE ID

Severity

Score

Technologies

Component name

CISA KEV exploit

Has fix

Published date

CVE-2025-67511CRITICAL9.6
  • PythonPython
  • cai-framework
NoNoDec 11, 2025
CVE-2025-13780CRITICAL9.1
  • PythonPython
  • cpe:2.3:a:pgadmin:pgadmin
NoYesDec 11, 2025
CVE-2025-67644HIGH7.3
  • PythonPython
  • langgraph-checkpoint-sqlite
NoYesDec 11, 2025
CVE-2025-67720MEDIUM6.5
  • PythonPython
  • pyrofork
NoYesDec 11, 2025
CVE-2025-67485MEDIUM5.3
  • PythonPython
  • mad-proxy
NoNoDec 10, 2025

Free Vulnerability Assessment

Benchmark your Cloud Security Posture

Evaluate your cloud security practices across 9 security domains to benchmark your risk level and identify gaps in your defenses.

Request assessment

Get a personalized demo

Ready to see Wiz in action?

"Best User Experience I have ever seen, provides full visibility to cloud workloads."
David EstlickCISO
"Wiz provides a single pane of glass to see what is going on in our cloud environments."
Adam FletcherChief Security Officer
"We know that if Wiz identifies something as critical, it actually is."
Greg PoniatowskiHead of Threat and Vulnerability Management