
Cloud Vulnerability DB
A community-led vulnerabilities database
Tensorflow, an Open Source Machine Learning Framework, was found to contain a vulnerability (CVE-2022-23569) where multiple operations could trigger a denial of service via CHECK-fails (assertion failures). The vulnerability was discovered in versions prior to 2.8.0 and was reported by Faysal Hossain Shezan from University of Virginia (GitHub Advisory).
The vulnerability is similar to TFSA-2021-198 (CVE-2021-41197) and involves assertion failures in multiple TensorFlow operations. The issue received a CVSS v3.1 Base Score of 6.5 (MEDIUM) with vector: CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H, indicating network accessibility with low attack complexity and requiring low privileges (NVD).
The vulnerability can be exploited to trigger a denial of service attack through assertion failures in TensorFlow operations. The impact is limited to availability, with no direct impact on confidentiality or integrity of the system (GitHub Advisory).
The vulnerability was patched in TensorFlow 2.8.0, with backported fixes in versions 2.7.1, 2.6.3, and 2.5.3. Users are advised to upgrade to these patched versions. The development team has noted that other similar instances might exist in TensorFlow, and they will issue fixes as these are discovered (GitHub Advisory).
Source: This report was generated using AI
Free Vulnerability Assessment
Evaluate your cloud security practices across 9 security domains to benchmark your risk level and identify gaps in your defenses.
Get a personalized demo
"Best User Experience I have ever seen, provides full visibility to cloud workloads."
"Wiz provides a single pane of glass to see what is going on in our cloud environments."
"We know that if Wiz identifies something as critical, it actually is."