CVE-2022-23592: TensorFlow: heap OOB read in type inference engine

HIGH PoC AVAILABLE CISA: TRACK*
Published February 4, 2022
CISO Take

TensorFlow's type inference skips bounds checking in production builds (DCHECK is a no-op), allowing a low-privileged remote attacker to read heap memory or crash the service. Any organization exposing a TF model serving endpoint should patch to TF 2.8.0 immediately. Treat this as urgent if your TF inference API is reachable from untrusted networks or multi-tenant environments.

Risk Assessment

High risk for organizations running TensorFlow model serving endpoints accessible over the network. The combination of AV:N/AC:L/PR:L makes this trivially reachable—any authenticated (low-privilege) user of a TF serving API can trigger it. The confidentiality impact is HIGH due to heap memory disclosure, which may expose model weights, in-flight tensors, or adjacent memory. Availability is also HIGH due to potential crash/DoS. Not in CISA KEV and no known active exploitation, but the low complexity raises the odds of eventual weaponization.

Affected Systems

Package Ecosystem Vulnerable Range Patched
tensorflow pip No patch
195.0K OpenSSF 7.2 3.7K dependents Pushed 6d ago 4% patched ~1372d to patch Full package profile →

Do you use tensorflow? You're affected.

Severity & Risk

CVSS 3.1
8.1 / 10
EPSS
0.3%
chance of exploitation in 30 days
Higher than 55% of all CVEs
Exploitation Status
Exploit Available
Exploitation: MEDIUM
Sophistication
Moderate
Exploitation Confidence
medium
CISA SSVC: Public PoC
Public PoC indexed (trickest/cve)
Composite signal derived from CISA KEV, CISA SSVC, EPSS, trickest/cve, and Nuclei templates.

Attack Surface

AV AC PR UI S C I A
AV Network
AC Low
PR Low
UI None
S Unchanged
C High
I None
A High

Recommended Action

5 steps
  1. Patch: Upgrade to TensorFlow 2.8.0 or later immediately—this is the only version containing the fix (commit c99d98c).

  2. Short-term: If patching is not immediately possible, restrict who can submit graphs to TF Serving endpoints—enforce authentication and authorization at the API gateway layer.

  3. Network segmentation: Ensure TF inference endpoints are not internet-facing; place behind VPN or internal load balancers.

  4. Detection: Monitor for abnormal crash/restart patterns in TF Serving processes (potential OOB exploitation attempts), or unusual memory access violations in application logs.

  5. Supply chain audit: Inventory all internal services and containers running TF <2.8.0 using your SBOM or image scanning tooling.

CISA SSVC Assessment

Decision Track*
Exploitation poc
Automatable No
Technical Impact partial

Source: CISA Vulnrichment (SSVC v2.0). Decision based on the CISA Coordinator decision tree.

Classification

Compliance Impact

This CVE is relevant to:

EU AI Act
Article 15 - Accuracy, robustness and cybersecurity
ISO 42001
A.6.2.6 - AI system security and vulnerability management
NIST AI RMF
MANAGE 2.2 - Mechanisms are in place to respond to and recover from identified AI risks
OWASP LLM Top 10
LLM05:2025 - Supply Chain Vulnerabilities

Frequently Asked Questions

What is CVE-2022-23592?

TensorFlow's type inference skips bounds checking in production builds (DCHECK is a no-op), allowing a low-privileged remote attacker to read heap memory or crash the service. Any organization exposing a TF model serving endpoint should patch to TF 2.8.0 immediately. Treat this as urgent if your TF inference API is reachable from untrusted networks or multi-tenant environments.

Is CVE-2022-23592 actively exploited?

Proof-of-concept exploit code is publicly available for CVE-2022-23592, increasing the risk of exploitation.

How to fix CVE-2022-23592?

1. Patch: Upgrade to TensorFlow 2.8.0 or later immediately—this is the only version containing the fix (commit c99d98c). 2. Short-term: If patching is not immediately possible, restrict who can submit graphs to TF Serving endpoints—enforce authentication and authorization at the API gateway layer. 3. Network segmentation: Ensure TF inference endpoints are not internet-facing; place behind VPN or internal load balancers. 4. Detection: Monitor for abnormal crash/restart patterns in TF Serving processes (potential OOB exploitation attempts), or unusual memory access violations in application logs. 5. Supply chain audit: Inventory all internal services and containers running TF <2.8.0 using your SBOM or image scanning tooling.

What systems are affected by CVE-2022-23592?

This vulnerability affects the following AI/ML architecture patterns: model serving, training pipelines, inference API endpoints.

What is the CVSS score for CVE-2022-23592?

CVE-2022-23592 has a CVSS v3.1 base score of 8.1 (HIGH). The EPSS exploitation probability is 0.32%.

Technical Details

NVD Description

Tensorflow is an Open Source Machine Learning Framework. TensorFlow's type inference can cause a heap out of bounds read as the bounds checking is done in a `DCHECK` (which is a no-op during production). An attacker can control the `input_idx` variable such that `ix` would be larger than the number of values in `node_t.args`. The fix will be included in TensorFlow 2.8.0. This is the only affected version.

Exploitation Scenario

An attacker with low-privilege API access to a TF Serving instance (e.g., an internal ML platform with basic auth, or a multi-tenant SaaS that lets users run models) crafts a TensorFlow computation graph where the `input_idx` argument in a type inference call exceeds the number of actual node arguments. Because production TF builds strip DCHECK assertions, no bounds check occurs. The attacker submits this graph via the gRPC or REST inference API. TensorFlow reads beyond the valid heap allocation, potentially leaking adjacent memory contents—which in a busy inference server may include other users' tensor data, API credentials, or model weights. Repeated triggering can also crash the server (DoS). This is particularly dangerous in shared inference infrastructure serving multiple tenants.

Weaknesses (CWE)

CVSS Vector

CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:H

Timeline

Published
February 4, 2022
Last Modified
November 21, 2024
First Seen
February 4, 2022

Related Vulnerabilities