Cloud Defense Logo

Products

Solutions

Company

Book A Live Demo

CVE-2021-37655 : What You Need to Know

Learn about CVE-2021-37655, a high severity heap out-of-bounds vulnerability in TensorFlow. Understand the impact, affected versions, and mitigation steps to secure systems.

TensorFlow is an end-to-end open source platform for machine learning. In affected versions, an attacker can trigger a read from outside the bounds of heap allocated data by sending invalid arguments to

tf.raw_ops.ResourceScatterUpdate
.

Understanding CVE-2021-37655

This CVE involves a heap out-of-bounds vulnerability in

ResourceScatterUpdate
in TensorFlow.

What is CVE-2021-37655?

The vulnerability allows an attacker to read data from outside the allocated memory boundaries, potentially leading to unauthorized access and data leaks.

The Impact of CVE-2021-37655

With a CVSS base score of 7.3 (High Severity), this vulnerability has a low attack complexity but high confidentiality impact, making it crucial to address.

Technical Details of CVE-2021-37655

The issue arises from incomplete validation of the relationship between the shapes of

indices
and
updates
in the TensorFlow code. Validating the shape relationship can prevent the unauthorized data reads.

Vulnerability Description

The vulnerability stems from inadequate validation of tensor shapes, allowing an attacker to access data beyond the intended boundaries.

Affected Systems and Versions

Affected versions include TensorFlow >= 2.5.0, < 2.5.1, TensorFlow >= 2.4.0, < 2.4.3, and TensorFlow < 2.3.4.

Exploitation Mechanism

Attackers can exploit this vulnerability by sending specific invalid arguments to

tf.raw_ops.ResourceScatterUpdate
, enabling them to access unauthorized data.

Mitigation and Prevention

Addressing this CVE requires immediate action to secure affected systems and prevent potential data breaches.

Immediate Steps to Take

Users should update TensorFlow to the patched versions (2.5.1, 2.4.3, 2.3.4) to mitigate the risk of exploitation.

Long-Term Security Practices

Implement secure coding practices and regularly update TensorFlow to ensure protection against similar vulnerabilities.

Patching and Updates

Ensure timely application of security patches and updates provided by TensorFlow to address known vulnerabilities.

Popular CVEs

CVE Id

Published Date

Is your System Free of Underlying Vulnerabilities?
Find Out Now