Cloud Defense Logo

Products

Solutions

Company

Book A Live Demo

CVE-2022-35999 : Exploit Details and Defense Strategies

Discover the impact of CVE-2022-35999 affecting TensorFlow versions < 2.7.2, >= 2.8.0, < 2.8.1, and >= 2.9.0, < 2.9.1. Learn about the `CHECK` fail vulnerability and mitigation steps.

This article discusses the

CHECK
fail vulnerability in
Conv2DBackpropInput
in TensorFlow, impacting versions prior to 2.7.2, >= 2.8.0 and < 2.8.1, and >= 2.9.0 and < 2.9.1. The vulnerability can lead to a denial of service attack.

Understanding CVE-2022-35999

This section delves into the specifics of CVE-2022-35999.

What is CVE-2022-35999?

TensorFlow, an open-source machine learning platform, is affected by a vulnerability in

Conv2DBackpropInput
when certain inputs are received, leading to CPU/GPU kernel
CHECK
failures.

The Impact of CVE-2022-35999

The vulnerability allows attackers to trigger a denial of service attack, posing a high availability impact. A patch has been released and will be included in TensorFlow 2.10.0.

Technical Details of CVE-2022-35999

This section provides technical insights into CVE-2022-35999.

Vulnerability Description

The

Conv2DBackpropInput
vulnerability arises when empty
out_backprop
inputs are processed, resulting in
CHECK
failures.

Affected Systems and Versions

Versions of TensorFlow prior to 2.7.2, >= 2.8.0 and < 2.8.1, and >= 2.9.0 and < 2.9.1 are impacted by this vulnerability.

Exploitation Mechanism

The vulnerability can be exploited to launch denial of service attacks by utilizing the

CHECK
fail scenario.

Mitigation and Prevention

This section outlines steps to mitigate and prevent CVE-2022-35999.

Immediate Steps to Take

Users are advised to update to TensorFlow 2.10.0 or apply the patch included in GitHub commit 27a65a43cf763897fecfa5cdb5cc653fc5dd0346.

Long-Term Security Practices

Incorporate regular security updates and stay informed about vulnerabilities within TensorFlow.

Patching and Updates

Ensure prompt installation of patches and updates released by TensorFlow to mitigate the risk of exploitation.

Popular CVEs

CVE Id

Published Date

Is your System Free of Underlying Vulnerabilities?
Find Out Now