Cloud Defense Logo

Products

Solutions

Company

Book A Live Demo

CVE-2022-35937 : Vulnerability Insights and Analysis

Learn about CVE-2022-35937, an out-of-bounds read vulnerability in the `Gather_nd` operation within TensorFlow Lite. Find out the impact, affected versions, and mitigation steps.

A detailed overview of CVE-2022-35937, an out-of-bounds read vulnerability in the

Gather_nd
operation in TensorFlow Lite.

Understanding CVE-2022-35937

This section delves into the impact, technical details, and mitigation strategies related to the CVE-2022-35937 vulnerability.

What is CVE-2022-35937?

CVE-2022-35937 is an out-of-bounds read vulnerability in the

Gather_nd
operation within TensorFlow Lite. This vulnerability arises when the sizes of inputs and outputs are not correctly handled, leading to a memory read issue.

The Impact of CVE-2022-35937

The vulnerability has a CVSS v3.1 base score of 7.0, indicating a high severity issue. With a high availability impact and attack complexity, this vulnerability poses a significant risk to affected systems.

Technical Details of CVE-2022-35937

This section provides insights into the vulnerability description, affected systems and versions, and the exploitation mechanism.

Vulnerability Description

The flaw in the

Gather_nd
operation results in out-of-bounds memory access when the inputs exceed the output sizes.

Affected Systems and Versions

TensorFlow versions prior to 2.7.2, 2.8.0 to 2.8.1, and 2.9.0 to 2.9.1 are impacted by this vulnerability.

Exploitation Mechanism

The vulnerability triggers an out-of-bounds read by mishandling the sizes of inputs and outputs within the

Gather_nd
operation.

Mitigation and Prevention

Explore the immediate steps to take, long-term security practices, and the importance of patching and updates.

Immediate Steps to Take

Users are advised to update to TensorFlow 2.10.0 to mitigate the vulnerability. Additionally, patch versions 2.9.1, 2.8.1, and 2.7.2 also address this issue.

Long-Term Security Practices

Incorporate secure coding practices and regular security assessments to prevent similar vulnerabilities in the future.

Patching and Updates

Regularly update TensorFlow to the latest patched versions to ensure protection against potential exploits and vulnerabilities.

Popular CVEs

CVE Id

Published Date

Is your System Free of Underlying Vulnerabilities?
Find Out Now