CVE-2022-41885: TensorFlow: FusedResizeAndPadConv2D overflow causes DoS
HIGH PoC AVAILABLE CISA: TRACK*An unauthenticated remote attacker can crash any TensorFlow inference service by sending a request with an oversized tensor shape to FusedResizeAndPadConv2D, causing an integer overflow and service termination. Any internet-exposed TF Serving endpoint running image-based models is affected. Patch immediately to TensorFlow 2.11, 2.10.1, 2.9.3, or 2.8.4 and enforce tensor shape limits at your API gateway.
Risk Assessment
Effective risk is HIGH for organizations running public-facing TensorFlow Serving endpoints. CVSS 7.5 reflects network-reachable, zero-auth, low-complexity exploitation with full availability impact. The attack requires no ML knowledge—just a crafted HTTP request with large tensor dimensions. Mitigating factors: no code execution or data exfiltration possible; impact is limited to availability. Not in CISA KEV and no public exploit observed as of disclosure, but PoC is implicit in the advisory.
Affected Systems
| Package | Ecosystem | Vulnerable Range | Patched |
|---|---|---|---|
| tensorflow | pip | — | No patch |
Do you use tensorflow? You're affected.
Severity & Risk
Attack Surface
Recommended Action
5 steps-
PATCH
Upgrade TensorFlow to 2.11.0, or cherry-pick to 2.10.1 / 2.9.3 / 2.8.4. Commit: d66e1d568275e6a2947de97dca7a102a211e01ce.
-
INPUT VALIDATION
Enforce max tensor shape bounds at API ingress before passing to TF ops—reject requests with dimensions exceeding operational maximums.
-
API GATEWAY
Deploy rate limiting and request schema validation in front of TF Serving endpoints.
-
DETECTION
Monitor for abnormal OOM crashes or rapid process restarts in TF Serving logs as an indicator of exploitation attempts.
-
ISOLATION
Run TF Serving in containers with restart policies and resource limits to minimize availability impact.
CISA SSVC Assessment
Source: CISA Vulnrichment (SSVC v2.0). Decision based on the CISA Coordinator decision tree.
Classification
Compliance Impact
This CVE is relevant to:
Frequently Asked Questions
What is CVE-2022-41885?
An unauthenticated remote attacker can crash any TensorFlow inference service by sending a request with an oversized tensor shape to FusedResizeAndPadConv2D, causing an integer overflow and service termination. Any internet-exposed TF Serving endpoint running image-based models is affected. Patch immediately to TensorFlow 2.11, 2.10.1, 2.9.3, or 2.8.4 and enforce tensor shape limits at your API gateway.
Is CVE-2022-41885 actively exploited?
Proof-of-concept exploit code is publicly available for CVE-2022-41885, increasing the risk of exploitation.
How to fix CVE-2022-41885?
1. PATCH: Upgrade TensorFlow to 2.11.0, or cherry-pick to 2.10.1 / 2.9.3 / 2.8.4. Commit: d66e1d568275e6a2947de97dca7a102a211e01ce. 2. INPUT VALIDATION: Enforce max tensor shape bounds at API ingress before passing to TF ops—reject requests with dimensions exceeding operational maximums. 3. API GATEWAY: Deploy rate limiting and request schema validation in front of TF Serving endpoints. 4. DETECTION: Monitor for abnormal OOM crashes or rapid process restarts in TF Serving logs as an indicator of exploitation attempts. 5. ISOLATION: Run TF Serving in containers with restart policies and resource limits to minimize availability impact.
What systems are affected by CVE-2022-41885?
This vulnerability affects the following AI/ML architecture patterns: model serving, image processing pipelines, training pipelines.
What is the CVSS score for CVE-2022-41885?
CVE-2022-41885 has a CVSS v3.1 base score of 7.5 (HIGH). The EPSS exploitation probability is 0.16%.
Technical Details
NVD Description
TensorFlow is an open source platform for machine learning. When `tf.raw_ops.FusedResizeAndPadConv2D` is given a large tensor shape, it overflows. We have patched the issue in GitHub commit d66e1d568275e6a2947de97dca7a102a211e01ce. The fix will be included in TensorFlow 2.11. We will also cherrypick this commit on TensorFlow 2.10.1, 2.9.3, and TensorFlow 2.8.4, as these are also affected and still in supported range.
Exploitation Scenario
An adversary identifies a public-facing computer vision API (e.g., an image classification service built on TensorFlow Serving). They craft a gRPC or REST request invoking a model that uses FusedResizeAndPadConv2D with tensor shape dimensions set to values near INT32_MAX. The integer overflow triggers a crash in the serving process, causing a denial of service. If the service lacks restart supervision or resource isolation, this can result in prolonged outage. The attack requires no authentication, no ML expertise, and can be repeated to sustain the DoS.
Weaknesses (CWE)
CVSS Vector
CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H References
- github.com/tensorflow/tensorflow/blob/master/tensorflow/core/kernels/conv_ops_fused_image_transform.cc 3rd Party
- github.com/tensorflow/tensorflow/commit/d66e1d568275e6a2947de97dca7a102a211e01ce Patch 3rd Party
- github.com/tensorflow/tensorflow/security/advisories/GHSA-762h-vpvw-3rcx Exploit Patch 3rd Party
- github.com/gclonly/im Exploit
Timeline
Related Vulnerabilities
CVE-2020-15196 9.9 TensorFlow: heap OOB read in sparse/ragged count ops
Same package: tensorflow CVE-2020-15205 9.8 TensorFlow: heap overflow in StringNGrams, ASLR bypass
Same package: tensorflow CVE-2020-15208 9.8 TFLite: OOB read/write via tensor dimension mismatch
Same package: tensorflow CVE-2019-16778 9.8 TensorFlow: heap overflow in UnsortedSegmentSum op
Same package: tensorflow CVE-2022-23587 9.8 TensorFlow: integer overflow in Grappler enables RCE
Same package: tensorflow
AI Threat Alert