Cloud Defense Logo

Products

Solutions

Company

Book A Live Demo

CVE-2022-35992 : Vulnerability Insights and Analysis

Learn about CVE-2022-35992, a vulnerability in TensorFlow that can trigger a denial of service attack in versions prior to 2.7.2, between 2.8.0 to 2.8.1, and between 2.9.0 to 2.9.1. Discover the impact, exploitation mechanism, and mitigation steps.

This article provides detailed information about CVE-2022-35992, a vulnerability in TensorFlow that could lead to a denial of service attack.

Understanding CVE-2022-35992

The vulnerability lies in the

TensorListFromTensor
function in TensorFlow, affecting versions prior to 2.7.2, between 2.8.0 and 2.8.1, and between 2.9.0 and 2.9.1.

What is CVE-2022-35992?

TensorFlow, an open-source machine learning platform, is susceptible to a denial of service attack when

TensorListFromTensor
processes an
element_shape
with a rank greater than one, triggering a
CHECK
fail.

The Impact of CVE-2022-35992

With a CVSS base score of 5.9 and a base severity of MEDIUM, this vulnerability has a high attack complexity and can cause significant availability impact.

Technical Details of CVE-2022-35992

Vulnerability Description

The flaw in

TensorListFromTensor
can be exploited to launch denial of service attacks.

Affected Systems and Versions

TensorFlow versions prior to 2.7.2, 2.8.0 to 2.8.1, and 2.9.0 to 2.9.1 are affected by this vulnerability.

Exploitation Mechanism

The vulnerability arises when

TensorListFromTensor
processes an
element_shape
with a rank greater than one, leading to a
CHECK
fail.

Mitigation and Prevention

Immediate Steps to Take

It is recommended to update TensorFlow to version 2.10.0, which includes a patch for this vulnerability. For versions 2.9.1, 2.8.1, and 2.7.2, patches have been cherrypicked to address the issue.

Long-Term Security Practices

Regularly update TensorFlow to the latest version to ensure protection against known vulnerabilities.

Patching and Updates

Stay informed about security advisories and apply patches promptly to mitigate the risk of exploitation.

Popular CVEs

CVE Id

Published Date

Is your System Free of Underlying Vulnerabilities?
Find Out Now