Learn about CVE-2022-35972, a vulnerability in TensorFlow's `QuantizedBiasAdd` function, allowing denial-of-service attacks. Find out the impact, affected versions, and mitigation steps.
TensorFlow, an open-source platform for machine learning, is impacted by a vulnerability in the
QuantizedBiasAdd
function. This flaw can lead to a segfault, enabling attackers to launch denial-of-service attacks. The issue has been patched in the GitHub commit 785d67a78a1d533759fcd2f5e8d6ef778de849e0 and will be addressed in TensorFlow 2.10.0. Here's what you need to know about CVE-2022-35972.
Understanding CVE-2022-35972
This section delves into the details of the vulnerability affecting TensorFlow.
What is CVE-2022-35972?
The vulnerability arises from improper input validation in the
QuantizedBiasAdd
function of TensorFlow. It allows an attacker to trigger a denial-of-service attack by exploiting a segfault.
The Impact of CVE-2022-35972
With a CVSS base score of 5.9 (Medium Severity), the vulnerability's impact is significant. The attack complexity is high, and it can be exploited over a network, leading to a high availability impact.
Technical Details of CVE-2022-35972
Explore the essential technical aspects of CVE-2022-35972.
Vulnerability Description
The flaw in the
QuantizedBiasAdd
function results in a segfault, enabling attackers to perform denial-of-service attacks.
Affected Systems and Versions
The vulnerability affects TensorFlow versions prior to 2.7.2, as well as versions between 2.8.0 and 2.8.1, and between 2.9.0 and 2.9.1.
Exploitation Mechanism
By providing specific input tensors, attackers can exploit the
QuantizedBiasAdd
function to trigger a segfault and subsequently launch denial-of-service attacks.
Mitigation and Prevention
Discover the steps to mitigate and prevent CVE-2022-35972.
Immediate Steps to Take
As the issue has been patched in TensorFlow 2.10.0, users are advised to update their TensorFlow installations to the latest version to mitigate the vulnerability.
Long-Term Security Practices
Implement robust input validation and security controls to prevent similar vulnerabilities in the future.
Patching and Updates
Keep abreast of security advisories and apply patches promptly to address known vulnerabilities.