Miggo Logo

CVE-2021-37673: `CHECK`-fail in `MapStage`

5.5

CVSS Score
3.1

Basic Information

EPSS Score
0.00644%
Published
8/25/2021
Updated
11/13/2024
KEV Status
No
Technology
TechnologyPython

Technical Details

CVSS Vector
CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
Package NameEcosystemVulnerable VersionsFirst Patched Version
tensorflowpip< 2.3.42.3.4
tensorflowpip>= 2.4.0, < 2.4.32.4.3
tensorflowpip= 2.5.02.5.1
tensorflow-cpupip< 2.3.42.3.4
tensorflow-cpupip>= 2.4.0, < 2.4.32.4.3
tensorflow-cpupip= 2.5.02.5.1
tensorflow-gpupip< 2.3.42.3.4
tensorflow-gpupip>= 2.4.0, < 2.4.32.4.3
tensorflow-gpupip= 2.5.02.5.1

Vulnerability Intelligence
Miggo AIMiggo AI

Miggo AIRoot Cause Analysis

The vulnerability stems from the MapStageOp::Compute function in map_stage_op.cc, which handles input processing. The patch explicitly adds a check for key tensor emptiness (OP_REQUIRES(ctx, key_tensor->NumElements() > 0)), confirming this was the missing validation. The function's responsibility to validate inputs aligns with the CWE-20 (Improper Input Validation) classification. The direct correlation between the vulnerability description, patch location, and function role makes this identification high confidence.

Vulnerable functions

Only Mi**o us*rs **n s** t*is s**tion

WAF Protection Rules

WAF Rule

### Imp**t *n *tt**k*r **n tri***r * **ni*l o* s*rvi** vi* * `****K`-**il in `t*.r*w_ops.M*pSt***`: ```pyt*on import t*nsor*low *s t* t*.r*w_ops.M*pSt***( k*y=t*.*onst*nt([], s**p*=[*, *, *, *], *typ*=t*.int**), in*i**s=t*.*onst*nt((*), *typ*

Reasoning

T** vuln*r**ility st*ms *rom t** M*pSt***Op::*omput* *un*tion in m*p_st***_op.**, w*i** **n*l*s input pro**ssin*. T** p*t** *xpli*itly ***s * ****k *or k*y t*nsor *mptin*ss (OP_R*QUIR*S(*tx, k*y_t*nsor->Num*l*m*nts() > *)), *on*irmin* t*is w*s t** mi