CVE-2020-15193: TensorFlow: uninitialized memory corruption via dlpack
HIGH PoC AVAILABLEA low-privileged remote attacker can corrupt TensorFlow process memory by passing a malformed Python object to the DLPack interface, achieving high integrity impact. Patch to TensorFlow 2.2.1 or 2.3.1 immediately—all prior 2.x versions are affected. Prioritize any deployment where untrusted users can submit inference requests or execute TF code remotely.
Risk Assessment
CVSS 7.1 (High) with network-accessible attack vector, low complexity, and low privilege requirement makes this exploitable in most multi-tenant ML serving environments. Integrity impact is HIGH while confidentiality is unaffected, indicating the primary risk is memory/model output corruption rather than data exfiltration. The trivially low attack complexity—simply passing the wrong Python type—means exploitation requires no adversarial AI expertise. Not in CISA KEV but relevant to any organization running unpatched TF inference infrastructure exposed to low-trust users.
Affected Systems
| Package | Ecosystem | Vulnerable Range | Patched |
|---|---|---|---|
| tensorflow | pip | — | No patch |
| leap | — | — | No patch |
Severity & Risk
Attack Surface
Recommended Action
6 steps-
Patch immediately: upgrade to TensorFlow 2.2.1 or 2.3.1 (patch commit 22e07fb204386768e5bcbea563641ea11f96ceb8).
-
Inventory all TF deployments and identify any using dlpack.to_dlpack() directly or via dependent libraries.
-
If immediate patching is blocked, restrict execution of DLPack-related functions to fully trusted, authenticated users only.
-
In serving environments, enforce strict input type validation before passing data to DLPack interfaces.
-
Monitor TF inference services for unexpected crashes, memory errors, or process instability as potential exploitation indicators.
-
Review OpenSUSE Leap deployments specifically, as a separate advisory was issued for that platform.
Classification
Compliance Impact
This CVE is relevant to:
Frequently Asked Questions
What is CVE-2020-15193?
A low-privileged remote attacker can corrupt TensorFlow process memory by passing a malformed Python object to the DLPack interface, achieving high integrity impact. Patch to TensorFlow 2.2.1 or 2.3.1 immediately—all prior 2.x versions are affected. Prioritize any deployment where untrusted users can submit inference requests or execute TF code remotely.
Is CVE-2020-15193 actively exploited?
Proof-of-concept exploit code is publicly available for CVE-2020-15193, increasing the risk of exploitation.
How to fix CVE-2020-15193?
1. Patch immediately: upgrade to TensorFlow 2.2.1 or 2.3.1 (patch commit 22e07fb204386768e5bcbea563641ea11f96ceb8). 2. Inventory all TF deployments and identify any using dlpack.to_dlpack() directly or via dependent libraries. 3. If immediate patching is blocked, restrict execution of DLPack-related functions to fully trusted, authenticated users only. 4. In serving environments, enforce strict input type validation before passing data to DLPack interfaces. 5. Monitor TF inference services for unexpected crashes, memory errors, or process instability as potential exploitation indicators. 6. Review OpenSUSE Leap deployments specifically, as a separate advisory was issued for that platform.
What systems are affected by CVE-2020-15193?
This vulnerability affects the following AI/ML architecture patterns: model serving, training pipelines, inference.
What is the CVSS score for CVE-2020-15193?
CVE-2020-15193 has a CVSS v3.1 base score of 7.1 (HIGH). The EPSS exploitation probability is 0.21%.
Technical Details
NVD Description
In Tensorflow before versions 2.2.1 and 2.3.1, the implementation of `dlpack.to_dlpack` can be made to use uninitialized memory resulting in further memory corruption. This is because the pybind11 glue code assumes that the argument is a tensor. However, there is nothing stopping users from passing in a Python object instead of a tensor. The uninitialized memory address is due to a `reinterpret_cast` Since the `PyObject` is a Python object, not a TensorFlow Tensor, the cast to `EagerTensor` fails. The issue is patched in commit 22e07fb204386768e5bcbea563641ea11f96ceb8 and is released in TensorFlow versions 2.2.1, or 2.3.1.
Exploitation Scenario
An attacker with low-privilege access to a shared TensorFlow serving endpoint or multi-tenant ML notebook environment crafts a request that passes a standard Python object (a dict, list, or arbitrary class instance) directly to dlpack.to_dlpack() instead of a proper TF tensor. The pybind11 binding performs an unchecked reinterpret_cast from PyObject to EagerTensor, dereferencing uninitialized memory at an arbitrary address. This corrupts process memory, enabling the attacker to destabilize the inference service, corrupt in-flight model outputs for other users, or crash the TF runtime entirely—all achieved with basic Python knowledge and only low-privilege API access.
Weaknesses (CWE)
CVSS Vector
CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:H/A:L References
- lists.opensuse.org/opensuse-security-announce/2020-10/msg00065.html Mailing List 3rd Party
- github.com/tensorflow/tensorflow/commit/22e07fb204386768e5bcbea563641ea11f96ceb8 Patch 3rd Party
- github.com/tensorflow/tensorflow/releases/tag/v2.3.1 3rd Party
- github.com/tensorflow/tensorflow/security/advisories/GHSA-rjjg-hgv6-h69v Exploit 3rd Party
Timeline
Related Vulnerabilities
CVE-2020-15196 9.9 TensorFlow: heap OOB read in sparse/ragged count ops
Same package: tensorflow CVE-2020-15205 9.8 TensorFlow: heap overflow in StringNGrams, ASLR bypass
Same package: tensorflow CVE-2020-15208 9.8 TFLite: OOB read/write via tensor dimension mismatch
Same package: tensorflow CVE-2019-16778 9.8 TensorFlow: heap overflow in UnsortedSegmentSum op
Same package: tensorflow CVE-2022-23587 9.8 TensorFlow: integer overflow in Grappler enables RCE
Same package: tensorflow
AI Threat Alert