Learn about CVE-2023-25673: a high impact vulnerability in TensorFlow versions prior to 2.12.0 and 2.11.1. Update to mitigate the risk.
This CVE-2023-25673 involves a vulnerability found in TensorFlow related to a Floating Point Exception in TensorListSplit with XLA.
Understanding CVE-2023-25673
This section will provide an overview of the CVE-2023-25673 vulnerability in TensorFlow.
What is CVE-2023-25673?
TensorFlow, an open-source platform for machine learning, is impacted by this vulnerability in versions prior to 2.12.0 and 2.11.1. The issue lies in the Floating Point Exception in TensorListSplit with XLA. A resolution has been implemented in TensorFlow version 2.12.0 and version 2.11.1.
The Impact of CVE-2023-25673
The impact of this vulnerability is rated as high, with a base score of 7.5. It has a high availability impact, affecting the integrity of the system. The attack vector is through the network and requires low attack complexity.
Technical Details of CVE-2023-25673
In this section, we delve into the technical aspects of CVE-2023-25673.
Vulnerability Description
The vulnerability involves a Floating Point Exception in TensorListSplit with XLA in TensorFlow versions prior to 2.12.0 and 2.11.1.
Affected Systems and Versions
Exploitation Mechanism
The vulnerability can be exploited through the network with low attack complexity, leading to a high impact on system availability.
Mitigation and Prevention
To address and prevent the risks associated with CVE-2023-25673, follow these mitigation strategies.
Immediate Steps to Take
Long-Term Security Practices
Patching and Updates