Cloud Defense Logo

Products

Solutions

Company

Book A Live Demo

CVE-2022-35963 : Security Advisory and Response

Learn about CVE-2022-35963, a TensorFlow vulnerability involving `CHECK` failures in `FractionalAvgPoolGrad`, impacting versions < 2.7.2, >= 2.8.0, < 2.8.1, >= 2.9.0, < 2.9.1.

This article provides an overview of CVE-2022-35963, a vulnerability found in TensorFlow related to

CHECK
failures in
FractionalAvgPoolGrad
that could lead to a denial of service attack.

Understanding CVE-2022-20657

This section delves into the details of the vulnerability, its impact, technical aspects, and mitigation strategies.

What is CVE-2022-20657?

CVE-2022-35963 affects TensorFlow, an open-source machine learning platform. The issue arises from inadequate validation of input parameters, leading to a CHECK failure that can be exploited for a denial of service attack.

The Impact of CVE-2022-20657

The vulnerability has a CVSS base score of 5.9, indicating a medium severity issue. With a high attack complexity and impact on availability, this vulnerability can be exploited remotely without the need for user interaction.

Technical Details of CVE-2022-20657

This section covers specific technical details of the vulnerability.

Vulnerability Description

The vulnerability stems from the incomplete validation of

orig_input_tensor_shape
, leading to an overflow that triggers a
CHECK
failure, enabling malicious actors to launch denial of service attacks.

Affected Systems and Versions

The impacted versions of TensorFlow include < 2.7.2, >= 2.8.0, < 2.8.1, and >= 2.9.0, < 2.9.1.

Exploitation Mechanism

The vulnerability can be exploited remotely over the network without requiring any user privileges. It affects the availability of the TensorFlow platform.

Mitigation and Prevention

Understanding the steps to mitigate and prevent the exploit is crucial for maintaining system security.

Immediate Steps to Take

Users are advised to update TensorFlow to version 2.10.0, which contains the patch for this vulnerability. For versions 2.7.2, 2.8.1, and 2.9.1, the fix will be cherrypicked to ensure protection.

Long-Term Security Practices

Implementing secure coding practices, regular security updates, and monitoring for potential vulnerabilities can enhance the overall security posture.

Patching and Updates

Regularly applying security patches provided by TensorFlow, especially for critical vulnerabilities such as CVE-2022-35963, is essential to prevent exploitation and protect systems from potential threats.

Popular CVEs

CVE Id

Published Date

Is your System Free of Underlying Vulnerabilities?
Find Out Now