Cloud Defense Logo

Products

Solutions

Company

Book A Live Demo

CVE-2022-35967 : Vulnerability Insights and Analysis

Discover the impact of CVE-2022-35967 on TensorFlow due to QuantizedAdd function, leading to a denial of service attack. Learn about affected versions, mitigation steps, and prevention best practices.

TensorFlow, an open-source machine learning platform, is impacted by a vulnerability in

QuantizedAdd
that could lead to a denial of service attack. Learn more about the impact, description, affected systems, and mitigation steps.

Understanding CVE-2022-35967

This CVE discloses a vulnerability in TensorFlow related to the

QuantizedAdd
function that could result in a denial of service attack due to a segmentation fault.

What is CVE-2022-35967?

The CVE highlights an issue in TensorFlow where providing

min_input
or
max_input
tensors of a nonzero rank to the
QuantizedAdd
function causes a segfault, which can be exploited for a DoS attack.

The Impact of CVE-2022-35967

The vulnerability's CVSS base score is 5.9, indicating a medium severity issue with a high impact on availability. However, it does not affect confidentiality or integrity and requires no special privileges for exploitation.

Technical Details of CVE-2022-35967

This section covers the specific technical aspects of the CVE, including the vulnerability description, affected systems and versions, and the exploitation mechanism.

Vulnerability Description

The vulnerability in TensorFlow arises when certain inputs are provided to the

QuantizedAdd
function, leading to a segfault that could be leveraged for a denial of service attack.

Affected Systems and Versions

The affected versions of TensorFlow include < 2.7.2, >= 2.8.0 and < 2.8.1, and >= 2.9.0 and < 2.9.1. Users on these versions are at risk of exploitation.

Exploitation Mechanism

The vulnerability can be exploited by providing specific input data to the

QuantizedAdd
function, triggering a segfault and potentially disrupting the service.

Mitigation and Prevention

This section outlines the necessary steps to mitigate the risks posed by CVE-2022-35967 and prevent potential exploitation.

Immediate Steps to Take

Users are advised to update their TensorFlow installations to version 2.10.0 or apply the specific patch commit - 49b3824d83af706df0ad07e4e677d88659756d89. For those on affected versions 2.7.2, 2.8.1, and 2.9.1, the commit will also be backported.

Long-Term Security Practices

To enhance security posture, it is recommended to follow secure coding practices, regularly update software components, and stay informed about security advisories.

Patching and Updates

Stay informed about security releases from the TensorFlow project and promptly apply patches and updates to ensure your system is protected against known vulnerabilities.

Popular CVEs

CVE Id

Published Date

Is your System Free of Underlying Vulnerabilities?
Find Out Now