Cloud Defense Logo

Products

Solutions

Company

Book A Live Demo

CVE-2022-35998 : Security Advisory and Response

Learn about CVE-2022-35998, a `CHECK` fail vulnerability in TensorFlow, allowing denial of service attacks. Discover impact, affected versions, and mitigation steps.

A

CHECK
fail vulnerability in
EmptyTensorList
in TensorFlow could allow attackers to trigger a denial of service attack. Here's what you need to know about CVE-2022-35998.

Understanding CVE-2022-35998

This section provides detailed insights into the impact, technical details, and mitigation strategies related to CVE-2022-35998.

What is CVE-2022-35998?

CVE-2022-35998 is a vulnerability in TensorFlow, an open-source platform for machine learning. When

EmptyTensorList
receives an input
element_shape
with multiple dimensions, it results in a
CHECK
fail, which can be exploited to launch a denial of service attack.

The Impact of CVE-2022-35998

The vulnerability has a CVSS base score of 5.9, indicating a medium severity issue. The attack complexity is high with a network-based attack vector. Successful exploitation can result in a high availability impact.

Technical Details of CVE-2022-35998

Let's delve into the technical aspects of CVE-2022-35998.

Vulnerability Description

The vulnerability arises in the handling of input

element_shape
with more than one dimension by the
EmptyTensorList
function, leading to a
CHECK
fail.

Affected Systems and Versions

TensorFlow versions less than 2.7.2, between 2.8.0 and 2.8.1, and between 2.9.0 and 2.9.1 are affected by this vulnerability.

Exploitation Mechanism

Attackers can manipulate the

element_shape
input to trigger the
CHECK
fail, resulting in a denial of service condition.

Mitigation and Prevention

Protect your systems from CVE-2022-35998 with the following measures.

Immediate Steps to Take

Update TensorFlow to version 2.10.0 or apply the patch available in GitHub commit c8ba76d48567aed347508e0552a257641931024d.

Long-Term Security Practices

Regularly monitor security advisories and apply relevant patches promptly. Consider implementing input validation mechanisms to prevent similar vulnerabilities.

Patching and Updates

Ensure timely updates of TensorFlow to versions 2.10.0 or higher to mitigate the vulnerability effectively.

Popular CVEs

CVE Id

Published Date

Is your System Free of Underlying Vulnerabilities?
Find Out Now