CVE-2020-15210: TensorFlow Lite: memory corruption via aliased tensors
MEDIUM PoC AVAILABLEThis vulnerability allows a crafted TFLite model file to trigger memory corruption or crash any application running TensorFlow Lite inference. The primary risk is to systems that load externally-supplied or user-provided TFLite model files — patch to TF 1.15.4/2.0.3/2.1.2/2.2.1/2.3.1 immediately. If your stack runs fixed inference on internal models only, residual risk is low but patching remains mandatory.
Risk Assessment
Medium overall, but contextually high for any deployment accepting third-party TFLite model files. CVSS 6.5 with network attack vector and no privileges required is meaningful in model-serving pipelines. High attack complexity (crafting a valid-but-malicious model) prevents script-kiddie exploitation, but a motivated adversary with ML knowledge can reliably reproduce the condition. Availability impact is high (segfault crashes inference service); integrity impact is limited but memory corruption leaves open the possibility of further exploitation in hardened environments.
Affected Systems
| Package | Ecosystem | Vulnerable Range | Patched |
|---|---|---|---|
| tensorflow | pip | — | No patch |
| leap | — | — | No patch |
Severity & Risk
Attack Surface
Recommended Action
5 steps-
Patch: upgrade to TensorFlow 1.15.4, 2.0.3, 2.1.2, 2.2.1, or 2.3.1 — no workaround exists at the operator level.
-
Enforce model provenance: only load TFLite model files from signed, internally-controlled sources; reject user-supplied or third-party model files until provenance can be verified.
-
Add process isolation: run TFLite inference in sandboxed processes (containerized, separate user, seccomp) so a segfault cannot cascade to broader service availability.
-
Monitor for unexpected crashes in inference services — repeated segfaults may indicate active probing.
-
Audit model-update pipelines (OTA updates, CI/CD model artifacts) to ensure model files are hash-verified before deployment.
Classification
Compliance Impact
This CVE is relevant to:
Frequently Asked Questions
What is CVE-2020-15210?
This vulnerability allows a crafted TFLite model file to trigger memory corruption or crash any application running TensorFlow Lite inference. The primary risk is to systems that load externally-supplied or user-provided TFLite model files — patch to TF 1.15.4/2.0.3/2.1.2/2.2.1/2.3.1 immediately. If your stack runs fixed inference on internal models only, residual risk is low but patching remains mandatory.
Is CVE-2020-15210 actively exploited?
Proof-of-concept exploit code is publicly available for CVE-2020-15210, increasing the risk of exploitation.
How to fix CVE-2020-15210?
1. Patch: upgrade to TensorFlow 1.15.4, 2.0.3, 2.1.2, 2.2.1, or 2.3.1 — no workaround exists at the operator level. 2. Enforce model provenance: only load TFLite model files from signed, internally-controlled sources; reject user-supplied or third-party model files until provenance can be verified. 3. Add process isolation: run TFLite inference in sandboxed processes (containerized, separate user, seccomp) so a segfault cannot cascade to broader service availability. 4. Monitor for unexpected crashes in inference services — repeated segfaults may indicate active probing. 5. Audit model-update pipelines (OTA updates, CI/CD model artifacts) to ensure model files are hash-verified before deployment.
What systems are affected by CVE-2020-15210?
This vulnerability affects the following AI/ML architecture patterns: TFLite model serving, edge AI inference, mobile AI inference, model loading pipelines, CI/CD model evaluation pipelines.
What is the CVSS score for CVE-2020-15210?
CVE-2020-15210 has a CVSS v3.1 base score of 6.5 (MEDIUM). The EPSS exploitation probability is 0.33%.
Technical Details
NVD Description
In tensorflow-lite before versions 1.15.4, 2.0.3, 2.1.2, 2.2.1 and 2.3.1, if a TFLite saved model uses the same tensor as both input and output of an operator, then, depending on the operator, we can observe a segmentation fault or just memory corruption. We have patched the issue in d58c96946b and will release patch releases for all versions between 1.15 and 2.3. We recommend users to upgrade to TensorFlow 1.15.4, 2.0.3, 2.1.2, 2.2.1, or 2.3.1.
Exploitation Scenario
An adversary with knowledge of TFLite model format crafts a malicious .tflite model file where a specific operator is configured with the same tensor ID as both its input and output. The adversary targets an organization running a TFLite-based API endpoint (e.g., mobile backend inference, edge device management console) that accepts custom model uploads for on-device personalization. Upon upload and inference execution, the runtime dereferences the aliased tensor, producing either a segmentation fault — crashing the inference worker — or silent memory corruption that could be further leveraged for limited code execution. In a CI/CD context, injecting this model into an automated model-evaluation pipeline crashes the pipeline runner and delays model releases, constituting a supply chain disruption.
Weaknesses (CWE)
CVSS Vector
CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:L/A:H References
- lists.opensuse.org/opensuse-security-announce/2020-10/msg00065.html Mailing List 3rd Party
- github.com/tensorflow/tensorflow/commit/d58c96946b2880991d63d1dacacb32f0a4dfa453 Patch 3rd Party
- github.com/tensorflow/tensorflow/releases/tag/v2.3.1 3rd Party
- github.com/tensorflow/tensorflow/security/advisories/GHSA-x9j7-x98r-r4w2 Exploit 3rd Party
Timeline
Related Vulnerabilities
CVE-2020-15196 9.9 TensorFlow: heap OOB read in sparse/ragged count ops
Same package: tensorflow CVE-2020-15205 9.8 TensorFlow: heap overflow in StringNGrams, ASLR bypass
Same package: tensorflow CVE-2020-15208 9.8 TFLite: OOB read/write via tensor dimension mismatch
Same package: tensorflow CVE-2019-16778 9.8 TensorFlow: heap overflow in UnsortedSegmentSum op
Same package: tensorflow CVE-2022-23587 9.8 TensorFlow: integer overflow in Grappler enables RCE
Same package: tensorflow
AI Threat Alert