CVE-2022-35987: TensorFlow: DoS via DenseBincount shape mismatch
HIGH PoC AVAILABLEAny unauthenticated attacker can crash TensorFlow inference processes by sending a malformed weights tensor to any endpoint that invokes DenseBincount — no ML knowledge required. Patch to TF 2.10.0, 2.9.1, 2.8.1, or 2.7.2 immediately; no workaround exists. Prioritize externally exposed TF Serving deployments and any model API that accepts user-controlled tensor inputs.
Risk Assessment
High operational risk for organizations exposing TensorFlow-backed inference APIs. CVSS 7.5 — network-accessible, zero authentication, low complexity. Impact is limited to availability (no code execution, no data exfiltration), but a single malformed request crashes the serving process. In production AI pipelines without automatic restart, this translates to full service outage. Recommender systems and categorical preprocessing pipelines are most exposed due to typical DenseBincount usage patterns.
Affected Systems
| Package | Ecosystem | Vulnerable Range | Patched |
|---|---|---|---|
| tensorflow | pip | — | No patch |
Do you use tensorflow? You're affected.
Severity & Risk
Attack Surface
Recommended Action
5 steps-
Patch to TensorFlow 2.10.0 (or backport commits for 2.9.1/2.8.1/2.7.2) — this is the only fix.
-
Audit all model serving endpoints: identify which models route user input through DenseBincount and enforce input shape validation at the API layer before tensor construction.
-
Configure process supervisors (Kubernetes restartPolicy: Always, systemd Restart=always) to auto-restart crashed inference processes.
-
Apply rate limiting and input size caps on inference endpoints to reduce blast radius.
-
Scan your TF version inventory — any unpatched 2.7.x, 2.8.x, 2.9.x, or pre-2.10.0 deployment is vulnerable.
CISA SSVC Assessment
Source: CISA Vulnrichment (SSVC v2.0). Decision based on the CISA Coordinator decision tree.
Classification
Compliance Impact
This CVE is relevant to:
Frequently Asked Questions
What is CVE-2022-35987?
Any unauthenticated attacker can crash TensorFlow inference processes by sending a malformed weights tensor to any endpoint that invokes DenseBincount — no ML knowledge required. Patch to TF 2.10.0, 2.9.1, 2.8.1, or 2.7.2 immediately; no workaround exists. Prioritize externally exposed TF Serving deployments and any model API that accepts user-controlled tensor inputs.
Is CVE-2022-35987 actively exploited?
Proof-of-concept exploit code is publicly available for CVE-2022-35987, increasing the risk of exploitation.
How to fix CVE-2022-35987?
1. Patch to TensorFlow 2.10.0 (or backport commits for 2.9.1/2.8.1/2.7.2) — this is the only fix. 2. Audit all model serving endpoints: identify which models route user input through DenseBincount and enforce input shape validation at the API layer before tensor construction. 3. Configure process supervisors (Kubernetes restartPolicy: Always, systemd Restart=always) to auto-restart crashed inference processes. 4. Apply rate limiting and input size caps on inference endpoints to reduce blast radius. 5. Scan your TF version inventory — any unpatched 2.7.x, 2.8.x, 2.9.x, or pre-2.10.0 deployment is vulnerable.
What systems are affected by CVE-2022-35987?
This vulnerability affects the following AI/ML architecture patterns: model serving, training pipelines, inference.
What is the CVSS score for CVE-2022-35987?
CVE-2022-35987 has a CVSS v3.1 base score of 7.5 (HIGH). The EPSS exploitation probability is 0.06%.
Technical Details
NVD Description
TensorFlow is an open source platform for machine learning. `DenseBincount` assumes its input tensor `weights` to either have the same shape as its input tensor `input` or to be length-0. A different `weights` shape will trigger a `CHECK` fail that can be used to trigger a denial of service attack. We have patched the issue in GitHub commit bf4c14353c2328636a18bfad1e151052c81d5f43. The fix will be included in TensorFlow 2.10.0. We will also cherrypick this commit on TensorFlow 2.9.1, TensorFlow 2.8.1, and TensorFlow 2.7.2, as these are also affected and still in supported range. There are no known workarounds for this issue.
Exploitation Scenario
An attacker probes a public recommendation API backed by TensorFlow. They identify that the endpoint accepts item weight vectors alongside item IDs. By crafting a request where the weights tensor has a different shape than the input tensor — for example, passing a weights array of length 3 against an input array of length 10 — the DenseBincount CHECK assertion fires, immediately killing the TF Serving process. The attacker repeats this at low frequency (one request per minute) to prevent recovery. No ML expertise needed: the attacker only needs to know the endpoint accepts tensor inputs and that the target runs unpatched TensorFlow.
Weaknesses (CWE)
CVSS Vector
CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H References
Timeline
Related Vulnerabilities
CVE-2020-15196 9.9 TensorFlow: heap OOB read in sparse/ragged count ops
Same package: tensorflow CVE-2020-15205 9.8 TensorFlow: heap overflow in StringNGrams, ASLR bypass
Same package: tensorflow CVE-2020-15208 9.8 TFLite: OOB read/write via tensor dimension mismatch
Same package: tensorflow CVE-2019-16778 9.8 TensorFlow: heap overflow in UnsortedSegmentSum op
Same package: tensorflow CVE-2022-23587 9.8 TensorFlow: integer overflow in Grappler enables RCE
Same package: tensorflow
AI Threat Alert