CVE-2022-35970: TensorFlow: DoS via malformed QuantizedInstanceNorm tensors
HIGH PoC AVAILABLEAny TensorFlow Serving deployment running quantized models is vulnerable to unauthenticated remote crash — no credentials, no user interaction required. Patch immediately to TF 2.10.0, 2.9.1, 2.8.1, or 2.7.2; there are no workarounds. If inference endpoints are internet-exposed, treat this as critical regardless of the CVSS score.
Risk Assessment
CVSS 7.5 understates operational risk for AI infrastructure teams. The attack is network-accessible, requires zero authentication, and needs no user interaction — a script-kiddie can trigger it by sending a single malformed request. While confidentiality and integrity are unaffected, availability loss of a production inference service directly impacts revenue and SLA for any organization with real-time ML workloads. Risk escalates significantly when TF Serving endpoints are exposed without an API gateway or authentication layer.
Affected Systems
| Package | Ecosystem | Vulnerable Range | Patched |
|---|---|---|---|
| tensorflow | pip | — | No patch |
Do you use tensorflow? You're affected.
Severity & Risk
Attack Surface
Recommended Action
6 steps-
Patch: Upgrade TensorFlow to 2.10.0 or apply cherrypick commits to 2.9.1, 2.8.1, or 2.7.2 (commit 785d67a78a1d533759fcd2f5e8d6ef778de849e0).
-
No workaround exists — patching is the only fix.
-
Defense-in-depth: Place API gateways with authentication in front of all TF Serving endpoints; reject unauthenticated inference requests.
-
Input validation at the gateway layer: reject tensors with unexpected rank shapes before they reach TF Serving.
-
Monitor for inference service process crashes or unexpected restarts as an indicator of exploitation attempts.
-
Audit your model serving stack for use of quantized ops (grep model graphs for QuantizedInstanceNorm).
CISA SSVC Assessment
Source: CISA Vulnrichment (SSVC v2.0). Decision based on the CISA Coordinator decision tree.
Classification
Compliance Impact
This CVE is relevant to:
Frequently Asked Questions
What is CVE-2022-35970?
Any TensorFlow Serving deployment running quantized models is vulnerable to unauthenticated remote crash — no credentials, no user interaction required. Patch immediately to TF 2.10.0, 2.9.1, 2.8.1, or 2.7.2; there are no workarounds. If inference endpoints are internet-exposed, treat this as critical regardless of the CVSS score.
Is CVE-2022-35970 actively exploited?
Proof-of-concept exploit code is publicly available for CVE-2022-35970, increasing the risk of exploitation.
How to fix CVE-2022-35970?
1. Patch: Upgrade TensorFlow to 2.10.0 or apply cherrypick commits to 2.9.1, 2.8.1, or 2.7.2 (commit 785d67a78a1d533759fcd2f5e8d6ef778de849e0). 2. No workaround exists — patching is the only fix. 3. Defense-in-depth: Place API gateways with authentication in front of all TF Serving endpoints; reject unauthenticated inference requests. 4. Input validation at the gateway layer: reject tensors with unexpected rank shapes before they reach TF Serving. 5. Monitor for inference service process crashes or unexpected restarts as an indicator of exploitation attempts. 6. Audit your model serving stack for use of quantized ops (grep model graphs for QuantizedInstanceNorm).
What systems are affected by CVE-2022-35970?
This vulnerability affects the following AI/ML architecture patterns: quantized model serving, model serving, edge AI deployment, inference endpoints, training pipelines.
What is the CVSS score for CVE-2022-35970?
CVE-2022-35970 has a CVSS v3.1 base score of 7.5 (HIGH). The EPSS exploitation probability is 0.06%.
Technical Details
NVD Description
TensorFlow is an open source platform for machine learning. If `QuantizedInstanceNorm` is given `x_min` or `x_max` tensors of a nonzero rank, it results in a segfault that can be used to trigger a denial of service attack. We have patched the issue in GitHub commit 785d67a78a1d533759fcd2f5e8d6ef778de849e0. The fix will be included in TensorFlow 2.10.0. We will also cherrypick this commit on TensorFlow 2.9.1, TensorFlow 2.8.1, and TensorFlow 2.7.2, as these are also affected and still in supported range. There are no known workarounds for this issue.
Exploitation Scenario
Attacker discovers a TF Serving endpoint (e.g., via Shodan, port scan, or leaked internal API documentation). They craft an inference request that passes a non-scalar tensor (rank > 0) as the x_min or x_max input to a model containing QuantizedInstanceNorm. The TF runtime performs no rank validation, triggers a segfault in the serving process, and the inference server crashes. On Kubernetes or systemd-managed deployments the service auto-restarts, allowing a sustained low-rate DoS. On bare-metal or poorly monitored deployments, this can cause extended outages. No ML expertise required — just knowledge of TensorFlow's protobuf input format.
Weaknesses (CWE)
CVSS Vector
CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H References
- github.com/tensorflow/tensorflow/commit/785d67a78a1d533759fcd2f5e8d6ef778de849e0 Patch 3rd Party
- github.com/tensorflow/tensorflow/security/advisories/GHSA-g35r-369w-3fqp Patch 3rd Party
- github.com/YoussefJeridi/vulTenserflow Exploit
- github.com/YoussefJeridi/vulTensorflow Exploit
- github.com/gclonly/im Exploit
Timeline
Related Vulnerabilities
CVE-2020-15196 9.9 TensorFlow: heap OOB read in sparse/ragged count ops
Same package: tensorflow CVE-2020-15205 9.8 TensorFlow: heap overflow in StringNGrams, ASLR bypass
Same package: tensorflow CVE-2020-15208 9.8 TFLite: OOB read/write via tensor dimension mismatch
Same package: tensorflow CVE-2019-16778 9.8 TensorFlow: heap overflow in UnsortedSegmentSum op
Same package: tensorflow CVE-2022-23587 9.8 TensorFlow: integer overflow in Grappler enables RCE
Same package: tensorflow
AI Threat Alert