CVE-2022-35987: TensorFlow: DoS via DenseBincount shape mismatch

HIGH PoC AVAILABLE
Published September 16, 2022
CISO Take

Any unauthenticated attacker can crash TensorFlow inference processes by sending a malformed weights tensor to any endpoint that invokes DenseBincount — no ML knowledge required. Patch to TF 2.10.0, 2.9.1, 2.8.1, or 2.7.2 immediately; no workaround exists. Prioritize externally exposed TF Serving deployments and any model API that accepts user-controlled tensor inputs.

Risk Assessment

High operational risk for organizations exposing TensorFlow-backed inference APIs. CVSS 7.5 — network-accessible, zero authentication, low complexity. Impact is limited to availability (no code execution, no data exfiltration), but a single malformed request crashes the serving process. In production AI pipelines without automatic restart, this translates to full service outage. Recommender systems and categorical preprocessing pipelines are most exposed due to typical DenseBincount usage patterns.

Affected Systems

Package Ecosystem Vulnerable Range Patched
tensorflow pip No patch
195.0K OpenSSF 7.2 3.7K dependents Pushed 6d ago 4% patched ~1372d to patch Full package profile →

Do you use tensorflow? You're affected.

Severity & Risk

CVSS 3.1
7.5 / 10
EPSS
0.1%
chance of exploitation in 30 days
Higher than 20% of all CVEs
Exploitation Status
Exploit Available
Exploitation: MEDIUM
Sophistication
Trivial
Exploitation Confidence
medium
Public PoC indexed (trickest/cve)
Composite signal derived from CISA KEV, CISA SSVC, EPSS, trickest/cve, and Nuclei templates.

Attack Surface

AV AC PR UI S C I A
AV Network
AC Low
PR None
UI None
S Unchanged
C None
I None
A High

Recommended Action

5 steps
  1. Patch to TensorFlow 2.10.0 (or backport commits for 2.9.1/2.8.1/2.7.2) — this is the only fix.

  2. Audit all model serving endpoints: identify which models route user input through DenseBincount and enforce input shape validation at the API layer before tensor construction.

  3. Configure process supervisors (Kubernetes restartPolicy: Always, systemd Restart=always) to auto-restart crashed inference processes.

  4. Apply rate limiting and input size caps on inference endpoints to reduce blast radius.

  5. Scan your TF version inventory — any unpatched 2.7.x, 2.8.x, 2.9.x, or pre-2.10.0 deployment is vulnerable.

CISA SSVC Assessment

Decision Track
Exploitation none
Automatable No
Technical Impact partial

Source: CISA Vulnrichment (SSVC v2.0). Decision based on the CISA Coordinator decision tree.

Classification

Compliance Impact

This CVE is relevant to:

EU AI Act
Article 9 - Risk management system
ISO 42001
Clause 8.4 - AI system operation and monitoring
NIST AI RMF
MANAGE 2.2 - Mechanisms for sustaining AI system trustworthiness during operation
OWASP LLM Top 10
LLM04 - Model Denial of Service

Frequently Asked Questions

What is CVE-2022-35987?

Any unauthenticated attacker can crash TensorFlow inference processes by sending a malformed weights tensor to any endpoint that invokes DenseBincount — no ML knowledge required. Patch to TF 2.10.0, 2.9.1, 2.8.1, or 2.7.2 immediately; no workaround exists. Prioritize externally exposed TF Serving deployments and any model API that accepts user-controlled tensor inputs.

Is CVE-2022-35987 actively exploited?

Proof-of-concept exploit code is publicly available for CVE-2022-35987, increasing the risk of exploitation.

How to fix CVE-2022-35987?

1. Patch to TensorFlow 2.10.0 (or backport commits for 2.9.1/2.8.1/2.7.2) — this is the only fix. 2. Audit all model serving endpoints: identify which models route user input through DenseBincount and enforce input shape validation at the API layer before tensor construction. 3. Configure process supervisors (Kubernetes restartPolicy: Always, systemd Restart=always) to auto-restart crashed inference processes. 4. Apply rate limiting and input size caps on inference endpoints to reduce blast radius. 5. Scan your TF version inventory — any unpatched 2.7.x, 2.8.x, 2.9.x, or pre-2.10.0 deployment is vulnerable.

What systems are affected by CVE-2022-35987?

This vulnerability affects the following AI/ML architecture patterns: model serving, training pipelines, inference.

What is the CVSS score for CVE-2022-35987?

CVE-2022-35987 has a CVSS v3.1 base score of 7.5 (HIGH). The EPSS exploitation probability is 0.06%.

Technical Details

NVD Description

TensorFlow is an open source platform for machine learning. `DenseBincount` assumes its input tensor `weights` to either have the same shape as its input tensor `input` or to be length-0. A different `weights` shape will trigger a `CHECK` fail that can be used to trigger a denial of service attack. We have patched the issue in GitHub commit bf4c14353c2328636a18bfad1e151052c81d5f43. The fix will be included in TensorFlow 2.10.0. We will also cherrypick this commit on TensorFlow 2.9.1, TensorFlow 2.8.1, and TensorFlow 2.7.2, as these are also affected and still in supported range. There are no known workarounds for this issue.

Exploitation Scenario

An attacker probes a public recommendation API backed by TensorFlow. They identify that the endpoint accepts item weight vectors alongside item IDs. By crafting a request where the weights tensor has a different shape than the input tensor — for example, passing a weights array of length 3 against an input array of length 10 — the DenseBincount CHECK assertion fires, immediately killing the TF Serving process. The attacker repeats this at low frequency (one request per minute) to prevent recovery. No ML expertise needed: the attacker only needs to know the endpoint accepts tensor inputs and that the target runs unpatched TensorFlow.

Weaknesses (CWE)

CVSS Vector

CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H

Timeline

Published
September 16, 2022
Last Modified
November 21, 2024
First Seen
September 16, 2022

Related Vulnerabilities