Miggo Logo

CVE-2023-25661: TensorFlow Denial of Service vulnerability

6.5

CVSS Score
3.1

Basic Information

EPSS Score
0.31172%
Published
3/27/2023
Updated
9/1/2023
KEV Status
No
Technology
TechnologyPython

Technical Details

CVSS Vector
CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
Package NameEcosystemVulnerable VersionsFirst Patched Version
tensorflowpip< 2.11.12.11.1
tensorflow-cpupip< 2.11.12.11.1

Vulnerability Intelligence
Miggo AIMiggo AI

Miggo AIRoot Cause Analysis

The vulnerability stems from improper input validation in the Conv3DTranspose gradient computation. The TensorFlow commit 948fe63 shows added validation checks in conv_grad_ops_3d.cc to handle zero-dimension inputs. The Keras test case addition in 85db5d0 verifies this fix at the API level. The root cause is in the Conv3DBackpropInputOp implementation where missing dimension checks allowed invalid inputs to crash the process. The patched code explicitly checks for zero dimensions and early returns, confirming this as the vulnerable function.

Vulnerable functions

Only Mi**o us*rs **n s** t*is s**tion

WAF Protection Rules

WAF Rule

### Imp**t * m*li*ious inv*li* input *r*s**s * t*nsor*low mo**l (****k **il**) *n* **n ** us** to tri***r * **ni*l o* s*rvi** *tt**k. To minimiz* t** *u*, w* *uilt * simpl* sin*l*-l*y*r T*nsor*low mo**l *ont*inin* * *onvolution**Tr*nspos* l*y*r, w*i*

Reasoning

T** vuln*r**ility st*ms *rom improp*r input v*li**tion in t** *onv**Tr*nspos* *r**i*nt *omput*tion. T** T*nsor*low *ommit ******* s*ows ***** v*li**tion ****ks in *onv_*r**_ops_**.** to **n*l* z*ro-*im*nsion inputs. T** K*r*s t*st **s* ***ition in **