Cloud Defense Logo

Products

Solutions

Company

Book A Live Demo

CVE-2022-35972 : Vulnerability Insights and Analysis

Learn about CVE-2022-35972, a vulnerability in TensorFlow's `QuantizedBiasAdd` function, allowing denial-of-service attacks. Find out the impact, affected versions, and mitigation steps.

TensorFlow, an open-source platform for machine learning, is impacted by a vulnerability in the

QuantizedBiasAdd
function. This flaw can lead to a segfault, enabling attackers to launch denial-of-service attacks. The issue has been patched in the GitHub commit 785d67a78a1d533759fcd2f5e8d6ef778de849e0 and will be addressed in TensorFlow 2.10.0. Here's what you need to know about CVE-2022-35972.

Understanding CVE-2022-35972

This section delves into the details of the vulnerability affecting TensorFlow.

What is CVE-2022-35972?

The vulnerability arises from improper input validation in the

QuantizedBiasAdd
function of TensorFlow. It allows an attacker to trigger a denial-of-service attack by exploiting a segfault.

The Impact of CVE-2022-35972

With a CVSS base score of 5.9 (Medium Severity), the vulnerability's impact is significant. The attack complexity is high, and it can be exploited over a network, leading to a high availability impact.

Technical Details of CVE-2022-35972

Explore the essential technical aspects of CVE-2022-35972.

Vulnerability Description

The flaw in the

QuantizedBiasAdd
function results in a segfault, enabling attackers to perform denial-of-service attacks.

Affected Systems and Versions

The vulnerability affects TensorFlow versions prior to 2.7.2, as well as versions between 2.8.0 and 2.8.1, and between 2.9.0 and 2.9.1.

Exploitation Mechanism

By providing specific input tensors, attackers can exploit the

QuantizedBiasAdd
function to trigger a segfault and subsequently launch denial-of-service attacks.

Mitigation and Prevention

Discover the steps to mitigate and prevent CVE-2022-35972.

Immediate Steps to Take

As the issue has been patched in TensorFlow 2.10.0, users are advised to update their TensorFlow installations to the latest version to mitigate the vulnerability.

Long-Term Security Practices

Implement robust input validation and security controls to prevent similar vulnerabilities in the future.

Patching and Updates

Keep abreast of security advisories and apply patches promptly to address known vulnerabilities.

Popular CVEs

CVE Id

Published Date

Is your System Free of Underlying Vulnerabilities?
Find Out Now