// For flags

CVE-2022-23570

Null-dereference in Tensorflow

Severity Score

6.5
*CVSS v3.1

Exploit Likelihood

*EPSS

Affected Versions

*CPE

Public Exploits

1
*Multiple Sources

Exploited in Wild

-
*KEV

Decision

-
*SSVC
Descriptions

Tensorflow is an Open Source Machine Learning Framework. When decoding a tensor from protobuf, TensorFlow might do a null-dereference if attributes of some mutable arguments to some operations are missing from the proto. This is guarded by a `DCHECK`. However, `DCHECK` is a no-op in production builds and an assertion failure in debug builds. In the first case execution proceeds to the dereferencing of the null pointer, whereas in the second case it results in a crash due to the assertion failure. The fix will be included in TensorFlow 2.8.0. We will also cherrypick this commit on TensorFlow 2.7.1, and TensorFlow 2.6.3, as these are also affected and still in supported range.

Tensorflow es un Marco de Aprendizaje Automático de Código Abierto. Cuando es decodificado un tensor a partir de un protobuf, TensorFlow podría hacer una referencia nula si los atributos de algunos argumentos mutables de algunas operaciones faltan en el proto. Esto está protegido por un "DCHECK". Sin embargo, "DCHECK" es un no-op en las construcciones de producción y un fallo de aserción en las construcciones de depuración. En el primer caso la ejecución procede a una desreferenciación de puntero null, mientras que en el segundo caso resulta en un fallo debido a aserción. La corrección será incluida en TensorFlow versión 2.8.0. También seleccionaremos este commit en TensorFlow versión 2.7.1, y TensorFlow versión 2.6.3, ya que estos también están afectados y aún están en el rango admitido

*Credits: N/A
CVSS Scores
Attack Vector
Network
Attack Complexity
Low
Privileges Required
Low
User Interaction
None
Scope
Unchanged
Confidentiality
None
Integrity
None
Availability
High
Attack Vector
Network
Attack Complexity
Low
Authentication
Single
Confidentiality
None
Integrity
None
Availability
Partial
* Common Vulnerability Scoring System
SSVC
  • Decision:-
Exploitation
-
Automatable
-
Tech. Impact
-
* Organization's Worst-case Scenario
Timeline
  • 2022-01-19 CVE Reserved
  • 2022-02-04 CVE Published
  • 2023-10-25 EPSS Updated
  • 2024-08-03 CVE Updated
  • 2024-08-03 First Exploit
  • ---------- Exploited in Wild
  • ---------- KEV Due Date
CWE
  • CWE-476: NULL Pointer Dereference
  • CWE-617: Reachable Assertion
CAPEC
Affected Vendors, Products, and Versions
Vendor Product Version Other Status
Vendor Product Version Other Status <-- --> Vendor Product Version Other Status
Google
Search vendor "Google"
Tensorflow
Search vendor "Google" for product "Tensorflow"
<= 2.5.2
Search vendor "Google" for product "Tensorflow" and version " <= 2.5.2"
-
Affected
Google
Search vendor "Google"
Tensorflow
Search vendor "Google" for product "Tensorflow"
>= 2.6.0 <= 2.6.2
Search vendor "Google" for product "Tensorflow" and version " >= 2.6.0 <= 2.6.2"
-
Affected
Google
Search vendor "Google"
Tensorflow
Search vendor "Google" for product "Tensorflow"
2.7.0
Search vendor "Google" for product "Tensorflow" and version "2.7.0"
-
Affected