
Cloud Vulnerability DB
A community-led vulnerabilities database
A vulnerability was discovered in TensorFlow's Grappler component that could trigger a null pointer dereference under certain scenarios. The vulnerability (CVE-2022-23589) affects TensorFlow versions prior to 2.8.0 and was disclosed on February 2, 2022. The issue occurs when processing maliciously altered SavedModel files (GitHub Advisory).
The vulnerability exists in two locations within the Grappler component, both triggered by the same malicious alteration of a SavedModel file. The first occurrence is during constant folding, where the GraphDef might not have the required nodes for binary operations, leading to a null pointer dereference when accessing mul_left_child or mul_right_child. The second instance occurs during IsIdentityConsumingSwitch operation where input_node could be null. The vulnerability has a CVSS v3.1 Base Score of 6.5 (MEDIUM) with vector: CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H (NVD).
The vulnerability can lead to a denial of service through null pointer dereference when processing specially crafted SavedModel files. The impact is limited to availability with no direct impact on confidentiality or integrity of the system (GitHub Advisory).
The vulnerability has been patched in TensorFlow versions 2.8.0, 2.7.1, 2.6.3, and 2.5.3. Users should upgrade to these patched versions. The fix was implemented through two commits that add null pointer checks before dereferencing in both the constant folding and IsIdentityConsumingSwitch operations (GitHub Advisory).
Source: This report was generated using AI
Free Vulnerability Assessment
Evaluate your cloud security practices across 9 security domains to benchmark your risk level and identify gaps in your defenses.
Get a personalized demo
"Best User Experience I have ever seen, provides full visibility to cloud workloads."
"Wiz provides a single pane of glass to see what is going on in our cloud environments."
"We know that if Wiz identifies something as critical, it actually is."