Vulnerability Details CVE-2022-23566
Tensorflow is an Open Source Machine Learning Framework. TensorFlow is vulnerable to a heap OOB write in `Grappler`. The `set_output` function writes to an array at the specified index. Hence, this gives a malicious user a write primitive. The fix will be included in TensorFlow 2.8.0. We will also cherrypick this commit on TensorFlow 2.7.1, TensorFlow 2.6.3, and TensorFlow 2.5.3, as these are also affected and still in supported range.
Exploit prediction scoring system (EPSS) score
EPSS Score 0.004
EPSS Ranking 58.0%
CVSS Severity
CVSS v3 Score 8.8
CVSS v2 Score 6.5
Products affected by CVE-2022-23566
-
cpe:2.3:a:google:tensorflow:-
-
cpe:2.3:a:google:tensorflow:0.1.7
-
cpe:2.3:a:google:tensorflow:0.10.0
-
cpe:2.3:a:google:tensorflow:0.11.0
-
cpe:2.3:a:google:tensorflow:0.12.0
-
cpe:2.3:a:google:tensorflow:0.12.1
-
cpe:2.3:a:google:tensorflow:0.5.0
-
cpe:2.3:a:google:tensorflow:0.6.0
-
cpe:2.3:a:google:tensorflow:0.7.0
-
cpe:2.3:a:google:tensorflow:0.7.1
-
cpe:2.3:a:google:tensorflow:0.8.0
-
cpe:2.3:a:google:tensorflow:0.9.0
-
cpe:2.3:a:google:tensorflow:1.0.0
-
cpe:2.3:a:google:tensorflow:1.0.1
-
cpe:2.3:a:google:tensorflow:1.1.0
-
cpe:2.3:a:google:tensorflow:1.10.0
-
cpe:2.3:a:google:tensorflow:1.10.1
-
cpe:2.3:a:google:tensorflow:1.11.0
-
cpe:2.3:a:google:tensorflow:1.12.0
-
cpe:2.3:a:google:tensorflow:1.12.1
-
cpe:2.3:a:google:tensorflow:1.12.2
-
cpe:2.3:a:google:tensorflow:1.12.3
-
cpe:2.3:a:google:tensorflow:1.13.0
-
cpe:2.3:a:google:tensorflow:1.13.1
-
cpe:2.3:a:google:tensorflow:1.13.2
-
cpe:2.3:a:google:tensorflow:1.14.0
-
cpe:2.3:a:google:tensorflow:1.15.0
-
cpe:2.3:a:google:tensorflow:1.15.2
-
cpe:2.3:a:google:tensorflow:1.15.3
-
cpe:2.3:a:google:tensorflow:1.15.4
-
cpe:2.3:a:google:tensorflow:1.15.5
-
cpe:2.3:a:google:tensorflow:1.2.0
-
cpe:2.3:a:google:tensorflow:1.2.1
-
cpe:2.3:a:google:tensorflow:1.3.0
-
cpe:2.3:a:google:tensorflow:1.3.1
-
cpe:2.3:a:google:tensorflow:1.4.0
-
cpe:2.3:a:google:tensorflow:1.4.1
-
cpe:2.3:a:google:tensorflow:1.5.0
-
cpe:2.3:a:google:tensorflow:1.5.1
-
cpe:2.3:a:google:tensorflow:1.6.0
-
cpe:2.3:a:google:tensorflow:1.7.0
-
cpe:2.3:a:google:tensorflow:1.7.1
-
cpe:2.3:a:google:tensorflow:1.8.0
-
cpe:2.3:a:google:tensorflow:1.9.0
-
cpe:2.3:a:google:tensorflow:2.0.0
-
cpe:2.3:a:google:tensorflow:2.0.1
-
cpe:2.3:a:google:tensorflow:2.0.2
-
cpe:2.3:a:google:tensorflow:2.0.3
-
cpe:2.3:a:google:tensorflow:2.0.4
-
cpe:2.3:a:google:tensorflow:2.1.0
-
cpe:2.3:a:google:tensorflow:2.1.1
-
cpe:2.3:a:google:tensorflow:2.1.2
-
cpe:2.3:a:google:tensorflow:2.1.3
-
cpe:2.3:a:google:tensorflow:2.1.4
-
cpe:2.3:a:google:tensorflow:2.2.0
-
cpe:2.3:a:google:tensorflow:2.2.1
-
cpe:2.3:a:google:tensorflow:2.2.2
-
cpe:2.3:a:google:tensorflow:2.2.3
-
cpe:2.3:a:google:tensorflow:2.3.0
-
cpe:2.3:a:google:tensorflow:2.3.1
-
cpe:2.3:a:google:tensorflow:2.3.2
-
cpe:2.3:a:google:tensorflow:2.3.3
-
cpe:2.3:a:google:tensorflow:2.3.4
-
cpe:2.3:a:google:tensorflow:2.4.0
-
cpe:2.3:a:google:tensorflow:2.4.1
-
cpe:2.3:a:google:tensorflow:2.4.2
-
cpe:2.3:a:google:tensorflow:2.4.3
-
cpe:2.3:a:google:tensorflow:2.4.4
-
cpe:2.3:a:google:tensorflow:2.5.0
-
cpe:2.3:a:google:tensorflow:2.5.1
-
cpe:2.3:a:google:tensorflow:2.5.2
-
cpe:2.3:a:google:tensorflow:2.6.0
-
cpe:2.3:a:google:tensorflow:2.6.1
-
cpe:2.3:a:google:tensorflow:2.6.2
-
cpe:2.3:a:google:tensorflow:2.7.0