CVE-2022-35999: TensorFlow: DoS via empty Conv2DBackpropInput tensors
HIGHAny TensorFlow deployment accepting user-controlled inputs to Conv2D-based models is vulnerable to unauthenticated remote crash with CVSS 7.5. Upgrade to TensorFlow 2.10.0, 2.9.1, 2.8.1, or 2.7.2 immediately — no workarounds exist. Prioritize model serving endpoints exposed to untrusted traffic (TF Serving, REST wrappers).
Risk Assessment
High severity with critical exploitability characteristics: no authentication required, no user interaction, network-exploitable, and low attack complexity — any adversary can trigger it by crafting a tensor with a zero-dimension (e.g., shape [3,1,0,1]). Impact is limited to availability (DoS); no RCE or data exfiltration path exists. Risk is elevated for organizations running public-facing inference endpoints or multi-tenant training APIs built on unpatched TensorFlow. Not in CISA KEV and no known active exploitation, but the trivial exploit path warrants prompt patching.
Affected Systems
| Package | Ecosystem | Vulnerable Range | Patched |
|---|---|---|---|
| tensorflow | pip | — | No patch |
Do you use tensorflow? You're affected.
Severity & Risk
Attack Surface
Recommended Action
6 steps-
Patch immediately: upgrade to TensorFlow 2.10.0, 2.9.1, 2.8.1, or 2.7.2 (cherry-picked fix in all supported branches).
-
No vendor workaround exists — patching is the only remediation.
-
Defense-in-depth: add input validation at the application layer to reject tensors with any zero-dimension before reaching TensorFlow ops.
-
Deploy process supervisors (systemd restart policies, Kubernetes liveness probes) to auto-recover crashed serving instances.
-
Add monitoring/alerting on abnormal process restarts in ML serving infrastructure.
-
Inventory all TensorFlow versions across model serving, training, and MLOps tooling using SBOM or dependency scanning.
CISA SSVC Assessment
Source: CISA Vulnrichment (SSVC v2.0). Decision based on the CISA Coordinator decision tree.
Classification
Compliance Impact
This CVE is relevant to:
Frequently Asked Questions
What is CVE-2022-35999?
Any TensorFlow deployment accepting user-controlled inputs to Conv2D-based models is vulnerable to unauthenticated remote crash with CVSS 7.5. Upgrade to TensorFlow 2.10.0, 2.9.1, 2.8.1, or 2.7.2 immediately — no workarounds exist. Prioritize model serving endpoints exposed to untrusted traffic (TF Serving, REST wrappers).
Is CVE-2022-35999 actively exploited?
No confirmed active exploitation of CVE-2022-35999 has been reported, but organizations should still patch proactively.
How to fix CVE-2022-35999?
1. Patch immediately: upgrade to TensorFlow 2.10.0, 2.9.1, 2.8.1, or 2.7.2 (cherry-picked fix in all supported branches). 2. No vendor workaround exists — patching is the only remediation. 3. Defense-in-depth: add input validation at the application layer to reject tensors with any zero-dimension before reaching TensorFlow ops. 4. Deploy process supervisors (systemd restart policies, Kubernetes liveness probes) to auto-recover crashed serving instances. 5. Add monitoring/alerting on abnormal process restarts in ML serving infrastructure. 6. Inventory all TensorFlow versions across model serving, training, and MLOps tooling using SBOM or dependency scanning.
What systems are affected by CVE-2022-35999?
This vulnerability affects the following AI/ML architecture patterns: model serving, training pipelines, computer vision inference.
What is the CVSS score for CVE-2022-35999?
CVE-2022-35999 has a CVSS v3.1 base score of 7.5 (HIGH). The EPSS exploitation probability is 0.06%.
Technical Details
NVD Description
TensorFlow is an open source platform for machine learning. When `Conv2DBackpropInput` receives empty `out_backprop` inputs (e.g. `[3, 1, 0, 1]`), the current CPU/GPU kernels `CHECK` fail (one with dnnl, the other with cudnn). This can be used to trigger a denial of service attack. We have patched the issue in GitHub commit 27a65a43cf763897fecfa5cdb5cc653fc5dd0346. The fix will be included in TensorFlow 2.10.0. We will also cherrypick this commit on TensorFlow 2.9.1, TensorFlow 2.8.1, and TensorFlow 2.7.2, as these are also affected and still in supported range. There are no known workarounds for this issue.
Exploitation Scenario
An adversary discovers a public-facing model API (TensorFlow Serving, Flask/FastAPI wrapper, or Vertex AI endpoint) running a CNN-based computer vision model. They send a POST request with a crafted input tensor of shape [3, 1, 0, 1] — a valid-looking but empty tensor — targeting the Conv2DBackpropInput kernel. The CHECK assertion fires in the dnnl or cudnn kernel, crashing the TensorFlow runtime process. On containerized deployments without restart policies, this causes sustained service unavailability. On multi-tenant inference platforms, a single malicious user can DoS shared serving infrastructure affecting all tenants.
Weaknesses (CWE)
CVSS Vector
CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H References
Timeline
Related Vulnerabilities
CVE-2020-15196 9.9 TensorFlow: heap OOB read in sparse/ragged count ops
Same package: tensorflow CVE-2020-15205 9.8 TensorFlow: heap overflow in StringNGrams, ASLR bypass
Same package: tensorflow CVE-2020-15208 9.8 TFLite: OOB read/write via tensor dimension mismatch
Same package: tensorflow CVE-2019-16778 9.8 TensorFlow: heap overflow in UnsortedSegmentSum op
Same package: tensorflow CVE-2022-23587 9.8 TensorFlow: integer overflow in Grappler enables RCE
Same package: tensorflow
AI Threat Alert