Learn about CVE-2020-15209, a vulnerability in tensorflow-lite allowing a crafted model to cause a null pointer dereference. Find out the impacted systems, exploitation mechanism, and mitigation steps.
In tensorflow-lite before versions 1.15.4, 2.0.3, 2.1.2, 2.2.1, and 2.3.1, a crafted TFLite model can force a node to have as input a tensor backed by a
nullptr
buffer, leading to a null pointer dereference.
Understanding CVE-2020-15209
This CVE involves a vulnerability in tensorflow-lite that allows a crafted model to cause a null pointer dereference.
What is CVE-2020-15209?
A crafted TFLite model can manipulate a tensor to have a
nullptr
buffer, resulting in a null pointer dereference due to a buffer index change in the flatbuffer serialization.
The Impact of CVE-2020-15209
The vulnerability has a CVSS base score of 5.9, with high availability impact. It poses a medium severity risk with no confidentiality or integrity impact.
Technical Details of CVE-2020-15209
This section provides detailed technical information about the vulnerability.
Vulnerability Description
A crafted TFLite model can force a node to have a tensor with a
nullptr
buffer, leading to a null pointer dereference.
Affected Systems and Versions
Exploitation Mechanism
The vulnerability is exploited by changing a buffer index in the flatbuffer serialization to convert a read-only tensor to a read-write one, causing a null pointer dereference.
Mitigation and Prevention
Protect your systems from CVE-2020-15209 with the following measures.
Immediate Steps to Take
Long-Term Security Practices
Patching and Updates
Ensure timely application of patches released by TensorFlow to address the vulnerability.