CVE-2022-36027: TensorFlow: DoS crash in transposed conv quantization
HIGH PoC AVAILABLE CISA: TRACK*A remote, unauthenticated attacker can crash any Python process running TensorFlow's model converter by triggering the vulnerable per-channel quantization path for transposed convolutions — no privileges required. If your MLOps pipeline exposes model conversion as a service or accepts external model configs, this is a denial-of-service risk with CVSS 7.5. Patch immediately to TF 2.10.0 / 2.9.1 / 2.8.1 / 2.7.2; there are no workarounds.
Risk Assessment
Risk is elevated for organizations running TensorFlow conversion pipelines that accept external or untrusted model inputs. The CVSS 7.5 reflects low attack complexity, no authentication required, and full availability impact (process crash). However, impact is limited to availability — no data exfiltration or code execution. Real-world risk is highest in automated model optimization services, CI/CD pipelines that convert third-party models, and inference platforms that perform on-the-fly quantization. Not in CISA KEV and no known active exploitation, which tempers urgency slightly.
Affected Systems
| Package | Ecosystem | Vulnerable Range | Patched |
|---|---|---|---|
| tensorflow | pip | — | No patch |
Do you use tensorflow? You're affected.
Severity & Risk
Attack Surface
Recommended Action
5 steps-
Patch
Upgrade to TensorFlow 2.10.0, 2.9.1 (TF 2.9.x), 2.8.1 (TF 2.8.x), or 2.7.2 (TF 2.7.x). Verify via
pip show tensorflow | grep Version. -
Workaround
None available per TensorFlow advisory — patching is mandatory.
-
Input validation
If accepting external model files for conversion, add a model schema validation layer before invoking the converter; reject models with transposed convolution layers if patching is delayed.
-
Process isolation
Run model conversion jobs in isolated containers or subprocesses with resource limits and automatic restart — limits blast radius of crash to the conversion job, not the host service.
-
Detection
Monitor for unexpected TensorFlow process exits (exit code non-zero) in conversion pipelines; alert on repeated crashes from the same source IP/model submission.
CISA SSVC Assessment
Source: CISA Vulnrichment (SSVC v2.0). Decision based on the CISA Coordinator decision tree.
Classification
Compliance Impact
This CVE is relevant to:
Frequently Asked Questions
What is CVE-2022-36027?
A remote, unauthenticated attacker can crash any Python process running TensorFlow's model converter by triggering the vulnerable per-channel quantization path for transposed convolutions — no privileges required. If your MLOps pipeline exposes model conversion as a service or accepts external model configs, this is a denial-of-service risk with CVSS 7.5. Patch immediately to TF 2.10.0 / 2.9.1 / 2.8.1 / 2.7.2; there are no workarounds.
Is CVE-2022-36027 actively exploited?
Proof-of-concept exploit code is publicly available for CVE-2022-36027, increasing the risk of exploitation.
How to fix CVE-2022-36027?
1. **Patch**: Upgrade to TensorFlow 2.10.0, 2.9.1 (TF 2.9.x), 2.8.1 (TF 2.8.x), or 2.7.2 (TF 2.7.x). Verify via `pip show tensorflow | grep Version`. 2. **Workaround**: None available per TensorFlow advisory — patching is mandatory. 3. **Input validation**: If accepting external model files for conversion, add a model schema validation layer before invoking the converter; reject models with transposed convolution layers if patching is delayed. 4. **Process isolation**: Run model conversion jobs in isolated containers or subprocesses with resource limits and automatic restart — limits blast radius of crash to the conversion job, not the host service. 5. **Detection**: Monitor for unexpected TensorFlow process exits (exit code non-zero) in conversion pipelines; alert on repeated crashes from the same source IP/model submission.
What systems are affected by CVE-2022-36027?
This vulnerability affects the following AI/ML architecture patterns: training pipelines, model serving, MLOps pipelines, edge/mobile deployment pipelines.
What is the CVSS score for CVE-2022-36027?
CVE-2022-36027 has a CVSS v3.1 base score of 7.5 (HIGH). The EPSS exploitation probability is 0.27%.
Technical Details
NVD Description
TensorFlow is an open source platform for machine learning. When converting transposed convolutions using per-channel weight quantization the converter segfaults and crashes the Python process. We have patched the issue in GitHub commit aa0b852a4588cea4d36b74feb05d93055540b450. The fix will be included in TensorFlow 2.10.0. We will also cherrypick this commit on TensorFlow 2.9.1, TensorFlow 2.8.1, and TensorFlow 2.7.2, as these are also affected and still in supported range. There are no known workarounds for this issue.
Exploitation Scenario
An adversary targeting an MLOps platform that exposes a model optimization API (e.g., 'submit a TF SavedModel, receive a quantized TFLite file') crafts a model containing transposed convolution layers with per-channel weight quantization configured. Submitting this model to the conversion endpoint causes the TensorFlow converter to segfault, killing the backend Python worker. By submitting the malformed model repeatedly, the adversary can maintain a persistent denial-of-service against the conversion service, blocking legitimate model deployment and disrupting AI product pipelines. No authentication, no payload — just a structurally valid but pathological model file.
Weaknesses (CWE)
CVSS Vector
CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H References
Timeline
Related Vulnerabilities
CVE-2020-15196 9.9 TensorFlow: heap OOB read in sparse/ragged count ops
Same package: tensorflow CVE-2020-15205 9.8 TensorFlow: heap overflow in StringNGrams, ASLR bypass
Same package: tensorflow CVE-2020-15208 9.8 TFLite: OOB read/write via tensor dimension mismatch
Same package: tensorflow CVE-2019-16778 9.8 TensorFlow: heap overflow in UnsortedSegmentSum op
Same package: tensorflow CVE-2022-23587 9.8 TensorFlow: integer overflow in Grappler enables RCE
Same package: tensorflow
AI Threat Alert