CVE-2023-25661

MEDIUM

Google Tensorflow < 2.11.1 - Improper Input Validation

Title source: rule
STIX 2.1

Description

TensorFlow is an Open Source Machine Learning Framework. In versions prior to 2.11.1 a malicious invalid input crashes a tensorflow model (Check Failed) and can be used to trigger a denial of service attack. A proof of concept can be constructed with the `Convolution3DTranspose` function. This Convolution3DTranspose layer is a very common API in modern neural networks. The ML models containing such vulnerable components could be deployed in ML applications or as cloud services. This failure could be potentially used to trigger a denial of service attack on ML cloud services. An attacker must have privilege to provide input to a `Convolution3DTranspose` call. This issue has been patched and users are advised to upgrade to version 2.11.1. There are no known workarounds for this vulnerability.

Scores

CVSS v3 6.5
EPSS 0.0016
EPSS Percentile 36.9%
Attack Vector NETWORK
CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H

CISA SSVC

Vulnrichment
Exploitation poc
Automatable no
Technical Impact partial

Details

CWE
CWE-20
Status published
Products (3)
google/tensorflow < 2.11.1
pypi/tensorflow 0 - 2.11.1PyPI
pypi/tensorflow-cpu 0 - 2.11.1PyPI
Published Mar 27, 2023
Tracked Since Feb 18, 2026