Explore the details of CVE-2021-29602, a vulnerability in TensorFlow's `DepthwiseConv` TFLite operator allowing division by zero error. Learn about impacted versions, mitigation steps, and more.
TensorFlow is an end-to-end open source platform for machine learning. The implementation of the
DepthwiseConv
TFLite operator is vulnerable to a division by zero error. An attacker can craft a model such that input
's fourth dimension would be 0. The affected versions include TensorFlow < 2.1.4, >= 2.2.0, < 2.2.3, >= 2.3.0, < 2.3.3, and >= 2.4.0, < 2.4.2. The fix will be included in TensorFlow 2.5.0.
Understanding CVE-2021-29602
This section provides insights into the vulnerability and its impact.
What is CVE-2021-29602?
CVE-2021-29602 relates to a division by zero error in the
DepthwiseConv
TFLite operator in TensorFlow.
The Impact of CVE-2021-29602
The impact of this vulnerability is considered low with an attack complexity of HIGH and attack vector of LOCAL.
Technical Details of CVE-2021-29602
Let's dive deeper into the technical aspects of the CVE.
Vulnerability Description
The vulnerability in the
DepthwiseConv
TFLite operator allows attackers to trigger a division by zero error.
Affected Systems and Versions
Systems running TensorFlow versions < 2.1.4, >= 2.2.0, < 2.2.3, >= 2.3.0, < 2.3.3, and >= 2.4.0, < 2.4.2 are affected by this vulnerability.
Exploitation Mechanism
Attackers can exploit this vulnerability by crafting a model with a fourth dimension of the
input
set to 0.
Mitigation and Prevention
Learn how to mitigate and prevent the exploitation of CVE-2021-29602.
Immediate Steps to Take
Immediate actions include updating to TensorFlow 2.5.0 to patch the vulnerability.
Long-Term Security Practices
Incorporate secure coding practices and regularly update systems to reduce the risk of exploitation.
Patching and Updates
Ensure timely installation of patches and updates to stay protected against known vulnerabilities.