CVE-2022-36027: TensorFlow: DoS crash in transposed conv quantization

HIGH PoC AVAILABLE CISA: TRACK*
Published September 16, 2022
CISO Take

A remote, unauthenticated attacker can crash any Python process running TensorFlow's model converter by triggering the vulnerable per-channel quantization path for transposed convolutions — no privileges required. If your MLOps pipeline exposes model conversion as a service or accepts external model configs, this is a denial-of-service risk with CVSS 7.5. Patch immediately to TF 2.10.0 / 2.9.1 / 2.8.1 / 2.7.2; there are no workarounds.

Risk Assessment

Risk is elevated for organizations running TensorFlow conversion pipelines that accept external or untrusted model inputs. The CVSS 7.5 reflects low attack complexity, no authentication required, and full availability impact (process crash). However, impact is limited to availability — no data exfiltration or code execution. Real-world risk is highest in automated model optimization services, CI/CD pipelines that convert third-party models, and inference platforms that perform on-the-fly quantization. Not in CISA KEV and no known active exploitation, which tempers urgency slightly.

Affected Systems

Package Ecosystem Vulnerable Range Patched
tensorflow pip No patch
195.0K OpenSSF 7.2 3.7K dependents Pushed today 4% patched ~1372d to patch Full package profile →

Do you use tensorflow? You're affected.

Severity & Risk

CVSS 3.1
7.5 / 10
EPSS
0.3%
chance of exploitation in 30 days
Higher than 50% of all CVEs
Exploitation Status
Exploit Available
Exploitation: MEDIUM
Sophistication
Moderate
Exploitation Confidence
medium
CISA SSVC: Public PoC
Public PoC indexed (trickest/cve)
Composite signal derived from CISA KEV, CISA SSVC, EPSS, trickest/cve, and Nuclei templates.

Attack Surface

AV AC PR UI S C I A
AV Network
AC Low
PR None
UI None
S Unchanged
C None
I None
A High

Recommended Action

5 steps
  1. Patch

    Upgrade to TensorFlow 2.10.0, 2.9.1 (TF 2.9.x), 2.8.1 (TF 2.8.x), or 2.7.2 (TF 2.7.x). Verify via pip show tensorflow | grep Version.

  2. Workaround

    None available per TensorFlow advisory — patching is mandatory.

  3. Input validation

    If accepting external model files for conversion, add a model schema validation layer before invoking the converter; reject models with transposed convolution layers if patching is delayed.

  4. Process isolation

    Run model conversion jobs in isolated containers or subprocesses with resource limits and automatic restart — limits blast radius of crash to the conversion job, not the host service.

  5. Detection

    Monitor for unexpected TensorFlow process exits (exit code non-zero) in conversion pipelines; alert on repeated crashes from the same source IP/model submission.

CISA SSVC Assessment

Decision Track*
Exploitation poc
Automatable No
Technical Impact partial

Source: CISA Vulnrichment (SSVC v2.0). Decision based on the CISA Coordinator decision tree.

Classification

Compliance Impact

This CVE is relevant to:

EU AI Act
Article 15 - Accuracy, robustness and cybersecurity Article 9 - Risk management system
ISO 42001
A.10.1 - Information security in supplier relationships
NIST AI RMF
MANAGE 2.4 - Residual risks to individuals, groups, communities, organizations, and society are managed and documented

Frequently Asked Questions

What is CVE-2022-36027?

A remote, unauthenticated attacker can crash any Python process running TensorFlow's model converter by triggering the vulnerable per-channel quantization path for transposed convolutions — no privileges required. If your MLOps pipeline exposes model conversion as a service or accepts external model configs, this is a denial-of-service risk with CVSS 7.5. Patch immediately to TF 2.10.0 / 2.9.1 / 2.8.1 / 2.7.2; there are no workarounds.

Is CVE-2022-36027 actively exploited?

Proof-of-concept exploit code is publicly available for CVE-2022-36027, increasing the risk of exploitation.

How to fix CVE-2022-36027?

1. **Patch**: Upgrade to TensorFlow 2.10.0, 2.9.1 (TF 2.9.x), 2.8.1 (TF 2.8.x), or 2.7.2 (TF 2.7.x). Verify via `pip show tensorflow | grep Version`. 2. **Workaround**: None available per TensorFlow advisory — patching is mandatory. 3. **Input validation**: If accepting external model files for conversion, add a model schema validation layer before invoking the converter; reject models with transposed convolution layers if patching is delayed. 4. **Process isolation**: Run model conversion jobs in isolated containers or subprocesses with resource limits and automatic restart — limits blast radius of crash to the conversion job, not the host service. 5. **Detection**: Monitor for unexpected TensorFlow process exits (exit code non-zero) in conversion pipelines; alert on repeated crashes from the same source IP/model submission.

What systems are affected by CVE-2022-36027?

This vulnerability affects the following AI/ML architecture patterns: training pipelines, model serving, MLOps pipelines, edge/mobile deployment pipelines.

What is the CVSS score for CVE-2022-36027?

CVE-2022-36027 has a CVSS v3.1 base score of 7.5 (HIGH). The EPSS exploitation probability is 0.27%.

Technical Details

NVD Description

TensorFlow is an open source platform for machine learning. When converting transposed convolutions using per-channel weight quantization the converter segfaults and crashes the Python process. We have patched the issue in GitHub commit aa0b852a4588cea4d36b74feb05d93055540b450. The fix will be included in TensorFlow 2.10.0. We will also cherrypick this commit on TensorFlow 2.9.1, TensorFlow 2.8.1, and TensorFlow 2.7.2, as these are also affected and still in supported range. There are no known workarounds for this issue.

Exploitation Scenario

An adversary targeting an MLOps platform that exposes a model optimization API (e.g., 'submit a TF SavedModel, receive a quantized TFLite file') crafts a model containing transposed convolution layers with per-channel weight quantization configured. Submitting this model to the conversion endpoint causes the TensorFlow converter to segfault, killing the backend Python worker. By submitting the malformed model repeatedly, the adversary can maintain a persistent denial-of-service against the conversion service, blocking legitimate model deployment and disrupting AI product pipelines. No authentication, no payload — just a structurally valid but pathological model file.

Weaknesses (CWE)

CVSS Vector

CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H

Timeline

Published
September 16, 2022
Last Modified
November 21, 2024
First Seen
September 16, 2022

Related Vulnerabilities