CVE-2022-35970: TensorFlow: DoS via malformed QuantizedInstanceNorm tensors

HIGH PoC AVAILABLE
Published September 16, 2022
CISO Take

Any TensorFlow Serving deployment running quantized models is vulnerable to unauthenticated remote crash — no credentials, no user interaction required. Patch immediately to TF 2.10.0, 2.9.1, 2.8.1, or 2.7.2; there are no workarounds. If inference endpoints are internet-exposed, treat this as critical regardless of the CVSS score.

Risk Assessment

CVSS 7.5 understates operational risk for AI infrastructure teams. The attack is network-accessible, requires zero authentication, and needs no user interaction — a script-kiddie can trigger it by sending a single malformed request. While confidentiality and integrity are unaffected, availability loss of a production inference service directly impacts revenue and SLA for any organization with real-time ML workloads. Risk escalates significantly when TF Serving endpoints are exposed without an API gateway or authentication layer.

Affected Systems

Package Ecosystem Vulnerable Range Patched
tensorflow pip No patch
195.0K OpenSSF 7.2 3.7K dependents Pushed today 4% patched ~1372d to patch Full package profile →

Do you use tensorflow? You're affected.

Severity & Risk

CVSS 3.1
7.5 / 10
EPSS
0.1%
chance of exploitation in 30 days
Higher than 20% of all CVEs
Exploitation Status
Exploit Available
Exploitation: MEDIUM
Sophistication
Trivial
Exploitation Confidence
medium
Public PoC indexed (trickest/cve)
Composite signal derived from CISA KEV, CISA SSVC, EPSS, trickest/cve, and Nuclei templates.

Attack Surface

AV AC PR UI S C I A
AV Network
AC Low
PR None
UI None
S Unchanged
C None
I None
A High

Recommended Action

6 steps
  1. Patch: Upgrade TensorFlow to 2.10.0 or apply cherrypick commits to 2.9.1, 2.8.1, or 2.7.2 (commit 785d67a78a1d533759fcd2f5e8d6ef778de849e0).

  2. No workaround exists — patching is the only fix.

  3. Defense-in-depth: Place API gateways with authentication in front of all TF Serving endpoints; reject unauthenticated inference requests.

  4. Input validation at the gateway layer: reject tensors with unexpected rank shapes before they reach TF Serving.

  5. Monitor for inference service process crashes or unexpected restarts as an indicator of exploitation attempts.

  6. Audit your model serving stack for use of quantized ops (grep model graphs for QuantizedInstanceNorm).

CISA SSVC Assessment

Decision Track
Exploitation none
Automatable No
Technical Impact partial

Source: CISA Vulnrichment (SSVC v2.0). Decision based on the CISA Coordinator decision tree.

Classification

Compliance Impact

This CVE is relevant to:

EU AI Act
Article 15 - Accuracy, robustness and cybersecurity
ISO 42001
A.6.2.5 - AI system availability and resilience
NIST AI RMF
MANAGE 2.2 - Mechanisms to sustain AI system effectiveness and trustworthiness
OWASP LLM Top 10
LLM04 - Model Denial of Service

Frequently Asked Questions

What is CVE-2022-35970?

Any TensorFlow Serving deployment running quantized models is vulnerable to unauthenticated remote crash — no credentials, no user interaction required. Patch immediately to TF 2.10.0, 2.9.1, 2.8.1, or 2.7.2; there are no workarounds. If inference endpoints are internet-exposed, treat this as critical regardless of the CVSS score.

Is CVE-2022-35970 actively exploited?

Proof-of-concept exploit code is publicly available for CVE-2022-35970, increasing the risk of exploitation.

How to fix CVE-2022-35970?

1. Patch: Upgrade TensorFlow to 2.10.0 or apply cherrypick commits to 2.9.1, 2.8.1, or 2.7.2 (commit 785d67a78a1d533759fcd2f5e8d6ef778de849e0). 2. No workaround exists — patching is the only fix. 3. Defense-in-depth: Place API gateways with authentication in front of all TF Serving endpoints; reject unauthenticated inference requests. 4. Input validation at the gateway layer: reject tensors with unexpected rank shapes before they reach TF Serving. 5. Monitor for inference service process crashes or unexpected restarts as an indicator of exploitation attempts. 6. Audit your model serving stack for use of quantized ops (grep model graphs for QuantizedInstanceNorm).

What systems are affected by CVE-2022-35970?

This vulnerability affects the following AI/ML architecture patterns: quantized model serving, model serving, edge AI deployment, inference endpoints, training pipelines.

What is the CVSS score for CVE-2022-35970?

CVE-2022-35970 has a CVSS v3.1 base score of 7.5 (HIGH). The EPSS exploitation probability is 0.06%.

Technical Details

NVD Description

TensorFlow is an open source platform for machine learning. If `QuantizedInstanceNorm` is given `x_min` or `x_max` tensors of a nonzero rank, it results in a segfault that can be used to trigger a denial of service attack. We have patched the issue in GitHub commit 785d67a78a1d533759fcd2f5e8d6ef778de849e0. The fix will be included in TensorFlow 2.10.0. We will also cherrypick this commit on TensorFlow 2.9.1, TensorFlow 2.8.1, and TensorFlow 2.7.2, as these are also affected and still in supported range. There are no known workarounds for this issue.

Exploitation Scenario

Attacker discovers a TF Serving endpoint (e.g., via Shodan, port scan, or leaked internal API documentation). They craft an inference request that passes a non-scalar tensor (rank > 0) as the x_min or x_max input to a model containing QuantizedInstanceNorm. The TF runtime performs no rank validation, triggers a segfault in the serving process, and the inference server crashes. On Kubernetes or systemd-managed deployments the service auto-restarts, allowing a sustained low-rate DoS. On bare-metal or poorly monitored deployments, this can cause extended outages. No ML expertise required — just knowledge of TensorFlow's protobuf input format.

Weaknesses (CWE)

CVSS Vector

CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H

Timeline

Published
September 16, 2022
Last Modified
November 21, 2024
First Seen
September 16, 2022

Related Vulnerabilities