CVE-2022-0736: MLflow: insecure temp file handling causes DoS
HIGH PoC AVAILABLEMLflow experiment tracking servers with network exposure are vulnerable to unauthenticated DoS via insecure temporary file handling — no credentials required. Patch to 1.23.1 immediately; if delayed, isolate MLflow behind internal network controls. This disrupts ML training pipelines and model registry availability, not data confidentiality.
Risk Assessment
Risk is HIGH for teams running MLflow with any network exposure (CVSS 7.5, AV:N/AC:L/PR:N/UI:N). Low attack complexity means opportunistic exploitation is plausible even without targeted intent. Not in CISA KEV and no public PoC weaponization confirmed, which moderates urgency slightly. However, the no-auth vector in ML infrastructure makes this a priority patch for production MLOps environments.
Affected Systems
| Package | Ecosystem | Vulnerable Range | Patched |
|---|---|---|---|
| mlflow | pip | — | No patch |
Do you use mlflow? You're affected.
Severity & Risk
Attack Surface
Recommended Action
5 steps-
PATCH
Upgrade MLflow to 1.23.1+ immediately — this is the only full remediation.
-
ISOLATE
If patching is delayed, restrict MLflow server access to internal network only via firewall/security group rules; remove any public internet exposure.
-
DETECT
Monitor for repeated MLflow service crashes, anomalous temp file creation bursts in /tmp or MLflow working directories, and unexpected service restarts.
-
AUDIT
Inventory all MLflow deployments across dev/staging/prod and prioritize internet-facing instances.
-
HARDEN
Run MLflow under a dedicated low-privilege service account with restricted filesystem permissions.
Classification
Compliance Impact
This CVE is relevant to:
Frequently Asked Questions
What is CVE-2022-0736?
MLflow experiment tracking servers with network exposure are vulnerable to unauthenticated DoS via insecure temporary file handling — no credentials required. Patch to 1.23.1 immediately; if delayed, isolate MLflow behind internal network controls. This disrupts ML training pipelines and model registry availability, not data confidentiality.
Is CVE-2022-0736 actively exploited?
Proof-of-concept exploit code is publicly available for CVE-2022-0736, increasing the risk of exploitation.
How to fix CVE-2022-0736?
1. PATCH: Upgrade MLflow to 1.23.1+ immediately — this is the only full remediation. 2. ISOLATE: If patching is delayed, restrict MLflow server access to internal network only via firewall/security group rules; remove any public internet exposure. 3. DETECT: Monitor for repeated MLflow service crashes, anomalous temp file creation bursts in /tmp or MLflow working directories, and unexpected service restarts. 4. AUDIT: Inventory all MLflow deployments across dev/staging/prod and prioritize internet-facing instances. 5. HARDEN: Run MLflow under a dedicated low-privilege service account with restricted filesystem permissions.
What systems are affected by CVE-2022-0736?
This vulnerability affects the following AI/ML architecture patterns: training pipelines, model serving, MLOps/CI-CD pipelines.
What is the CVSS score for CVE-2022-0736?
CVE-2022-0736 has a CVSS v3.1 base score of 7.5 (HIGH). The EPSS exploitation probability is 0.63%.
Technical Details
NVD Description
Insecure Temporary File in GitHub repository mlflow/mlflow prior to 1.23.1.
Exploitation Scenario
An adversary with network-level access to a MLflow tracking server — including a compromised internal network or misconfigured VPC — sends crafted HTTP requests that trigger insecure temporary file creation. By exploiting the race condition (TOCTOU) or symlink substitution against predictably named temp files, the attacker causes MLflow to fail when writing artifacts or processing uploads. In a production MLOps pipeline, repeated crashes halt automated model training jobs and block deployments, creating a denial-of-service condition against the ML lifecycle without requiring any credentials.
Weaknesses (CWE)
CVSS Vector
CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H References
- github.com/mlflow/mlflow/commit/61984e6843d2e59235d82a580c529920cd8f3711 Patch 3rd Party
- huntr.dev/bounties/e5384764-c583-4dec-a1d8-4697f4e12f75 Exploit Patch 3rd Party
- github.com/20142995/nuclei-templates Exploit
- github.com/ARPSyndicate/cvemon Exploit
- github.com/cyb3r-w0lf/nuclei-template-collection Exploit
Timeline
Related Vulnerabilities
CVE-2025-15379 10.0 MLflow: RCE via unsanitized model dependency specs
Same package: mlflow CVE-2023-3765 10.0 MLflow: path traversal allows arbitrary file read
Same package: mlflow CVE-2023-1177 9.8 MLflow: path traversal allows arbitrary file read/write
Same package: mlflow CVE-2026-2635 9.8 mlflow: security flaw enables exploitation
Same package: mlflow CVE-2023-2780 9.8 MLflow: path traversal allows arbitrary file read/write
Same package: mlflow
AI Threat Alert