Learn about CVE-2022-35973, a vulnerability in TensorFlow's QuantizedMatMul function that can lead to a denial of service attack. Find out the impacted versions, mitigation steps, and patch details.
This article provides an overview of CVE-2022-35973, a vulnerability in TensorFlow that can lead to a denial of service attack by exploiting the
QuantizedMatMul
function.
Understanding CVE-2022-35973
CVE-2022-35973 is a vulnerability in TensorFlow that allows attackers to trigger a denial of service attack by providing nonscalar input to the
QuantizedMatMul
function.
What is CVE-2022-35973?
TensorFlow, an open-source platform for machine learning, is impacted by this vulnerability. Attackers can exploit this issue to cause a segfault, leading to a denial of service attack.
The Impact of CVE-2022-35973
The vulnerability has a CVSS base score of 5.9, indicating a medium severity level. It has a high impact on availability but does not affect confidentiality or integrity. The attack complexity is high, and it can be exploited over a network without requiring privileges or user interaction.
Technical Details of CVE-2022-35973
The vulnerability affects TensorFlow versions < 2.7.2, >= 2.8.0, < 2.8.1, and >= 2.9.0, < 2.9.1. The issue has been patched in GitHub commit aca766ac7693bf29ed0df55ad6bfcc78f35e7f48. The fix will be included in TensorFlow 2.10.0, with backports to TensorFlow 2.9.1, 2.8.1, and 2.7.2.
Vulnerability Description
The vulnerability arises when providing nonscalar input to specific parameters of the
QuantizedMatMul
function in TensorFlow, resulting in a segfault that can be exploited for a denial of service attack.
Affected Systems and Versions
TensorFlow versions < 2.7.2, >= 2.8.0, < 2.8.1, and >= 2.9.0, < 2.9.1 are affected by this vulnerability.
Exploitation Mechanism
By giving nonscalar input for certain parameters in the
QuantizedMatMul
function, attackers can exploit the vulnerability to trigger a denial of service attack.
Mitigation and Prevention
To address CVE-2022-35973, users are advised to take immediate steps and adopt long-term security practices.
Immediate Steps to Take
Update TensorFlow to version 2.10.0 to apply the patch. For users on affected versions, consider applying the backported fixes for TensorFlow 2.9.1, 2.8.1, and 2.7.2.
Long-Term Security Practices
Regularly update software, implement secure coding practices, and monitor for security advisories to prevent similar vulnerabilities in the future.
Patching and Updates
Stay informed about security updates from TensorFlow and apply patches promptly to protect against known vulnerabilities.