Learn about CVE-2022-23590 involving a vulnerability in Tensorflow where a `GraphDef` can be manipulated to crash a process. Find out the impact, affected versions, and mitigation steps.
Tensorflow is an Open Source Machine Learning Framework. A
GraphDef
from a TensorFlow SavedModel
can be maliciously altered to cause a TensorFlow process to crash due to encountering a StatusOr
value that is an error and forcibly extracting the value from it. The issue has been patched in multiple GitHub commits, which will be included in TensorFlow 2.8.0 and TensorFlow 2.7.1, both of which are affected.
Understanding CVE-2022-20657
This section will delve into what CVE-2022-23590 involves and its impact.
What is CVE-2022-20657?
CVE-2022-23590 involves a vulnerability in Tensorflow where a
GraphDef
from a TensorFlow SavedModel
can be manipulated to crash a TensorFlow process by extracting an error-containing StatusOr
value.
The Impact of CVE-2022-20657
The impact of this vulnerability is rated as MEDIUM with a CVSS base score of 5.9. It has a high availability impact and requires no special privileges for exploitation. Confidentiality and integrity impacts are assessed as none.
Technical Details of CVE-2022-20657
In this section, we will explore the technical aspects of the CVE in more detail.
Vulnerability Description
The vulnerability arises from the ability to modify a
GraphDef
to trigger a crash in a TensorFlow process by interacting with a faulty StatusOr
value.
Affected Systems and Versions
Tensorflow versions that are affected include >= 2.7.0 and < 2.8.0.
Exploitation Mechanism
The vulnerability can be exploited by maliciously altering the
GraphDef
from a TensorFlow SavedModel
to extract an error-containing StatusOr
value.
Mitigation and Prevention
This section will outline steps to mitigate the impact of CVE-2022-23590 and prevent future occurrences.
Immediate Steps to Take
Long-Term Security Practices
Patching and Updates