
Cloud Vulnerability DB
A community-led vulnerabilities database
Tensorflow, an Open Source Machine Learning Framework, was found to contain a vulnerability (CVE-2022-23565) where an attacker could trigger a denial of service via assertion failure. The vulnerability was discovered when an attacker could alter a SavedModel on disk such that AttrDefs of some operation are duplicated. The issue was reported on February 4, 2022, affecting versions prior to 2.8.0 (GitHub Advisory, NVD).
The vulnerability exists in the TensorFlow framework's handling of AttrDef definitions. When a SavedModel is altered to contain duplicate AttrDefs for an operation, it triggers an assertion failure in the debug mode. The issue stems from a DCHECK condition in the code that verifies the uniqueness of AttrDef names. The CVSS v3.1 base score for this vulnerability is 6.5 (Medium), with the vector string CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H (NVD).
The vulnerability can lead to a denial of service condition when exploited. When an attacker provides a maliciously crafted SavedModel with duplicate AttrDefs, it causes the system to fail, potentially disrupting the service availability (GitHub Advisory).
The vulnerability has been patched in TensorFlow version 2.8.0. The fix was also backported to versions 2.7.1, 2.6.3, and 2.5.3. The patch replaces the DCHECK assertion with a proper error logging mechanism, allowing the system to continue operation while recording the error condition. Users are advised to upgrade to these patched versions (GitHub Advisory).
Source: This report was generated using AI
Free Vulnerability Assessment
Evaluate your cloud security practices across 9 security domains to benchmark your risk level and identify gaps in your defenses.
Get a personalized demo
"Best User Experience I have ever seen, provides full visibility to cloud workloads."
"Wiz provides a single pane of glass to see what is going on in our cloud environments."
"We know that if Wiz identifies something as critical, it actually is."