CVE-2022-41886: TensorFlow: integer overflow in image op causes DoS

HIGH PoC AVAILABLE CISA: TRACK*
Published November 18, 2022
CISO Take

This vulnerability allows unauthenticated remote attackers to crash TensorFlow-based inference services by sending a crafted request with an oversized output shape parameter. Any externally-exposed TF image processing endpoint is a direct DoS target with no prerequisites. Patch immediately to TensorFlow 2.11, 2.10.1, 2.9.3, or 2.8.4, and add input validation at your API boundary for shape parameters.

Risk Assessment

High severity (CVSS 7.5) with low exploitability barrier: network-accessible, no authentication, no user interaction. The impact is limited to availability (no data exfiltration risk), but in production ML serving environments a persistent crash loop or repeated triggering can result in sustained service outage. Risk is elevated for computer vision APIs that accept user-controlled image transformation parameters.

Affected Systems

Package Ecosystem Vulnerable Range Patched
tensorflow pip No patch
195.0K OpenSSF 7.2 3.7K dependents Pushed today 4% patched ~1372d to patch Full package profile →

Do you use tensorflow? You're affected.

Severity & Risk

CVSS 3.1
7.5 / 10
EPSS
0.1%
chance of exploitation in 30 days
Higher than 34% of all CVEs
Exploitation Status
Exploit Available
Exploitation: MEDIUM
Sophistication
Trivial
Exploitation Confidence
medium
CISA SSVC: Public PoC
Public PoC indexed (trickest/cve)
Composite signal derived from CISA KEV, CISA SSVC, EPSS, trickest/cve, and Nuclei templates.

Attack Surface

AV AC PR UI S C I A
AV Network
AC Low
PR None
UI None
S Unchanged
C None
I None
A High

Recommended Action

5 steps
  1. PATCH

    Upgrade to TensorFlow 2.11, or cherrypick commit 8faa6ea692985dbe6ce10e1a3168e0bd60a723ba into 2.10.1, 2.9.3, or 2.8.4.

  2. VALIDATE

    Add server-side bounds checking on output_shape parameters before passing to image ops — reject requests where product of dimensions exceeds a safe threshold (e.g., 4096x4096).

  3. ISOLATE

    Run TF serving workers in containers with auto-restart policies; consider per-request resource limits to contain blast radius.

  4. MONITOR

    Alert on abnormal TF worker crash rates as an indicator of exploitation attempts.

  5. AUDIT

    Inventory all internal services using ImageProjectiveTransformV2 or related projection ops.

CISA SSVC Assessment

Decision Track*
Exploitation poc
Automatable No
Technical Impact partial

Source: CISA Vulnrichment (SSVC v2.0). Decision based on the CISA Coordinator decision tree.

Classification

Compliance Impact

This CVE is relevant to:

EU AI Act
Article 15 - Accuracy, robustness and cybersecurity
ISO 42001
A.6.2.6 - AI system operational continuity
NIST AI RMF
MANAGE 2.2 - Mechanisms to respond to AI risks
OWASP LLM Top 10
LLM04 - Model Denial of Service

Frequently Asked Questions

What is CVE-2022-41886?

This vulnerability allows unauthenticated remote attackers to crash TensorFlow-based inference services by sending a crafted request with an oversized output shape parameter. Any externally-exposed TF image processing endpoint is a direct DoS target with no prerequisites. Patch immediately to TensorFlow 2.11, 2.10.1, 2.9.3, or 2.8.4, and add input validation at your API boundary for shape parameters.

Is CVE-2022-41886 actively exploited?

Proof-of-concept exploit code is publicly available for CVE-2022-41886, increasing the risk of exploitation.

How to fix CVE-2022-41886?

1. PATCH: Upgrade to TensorFlow 2.11, or cherrypick commit 8faa6ea692985dbe6ce10e1a3168e0bd60a723ba into 2.10.1, 2.9.3, or 2.8.4. 2. VALIDATE: Add server-side bounds checking on output_shape parameters before passing to image ops — reject requests where product of dimensions exceeds a safe threshold (e.g., 4096x4096). 3. ISOLATE: Run TF serving workers in containers with auto-restart policies; consider per-request resource limits to contain blast radius. 4. MONITOR: Alert on abnormal TF worker crash rates as an indicator of exploitation attempts. 5. AUDIT: Inventory all internal services using `ImageProjectiveTransformV2` or related projection ops.

What systems are affected by CVE-2022-41886?

This vulnerability affects the following AI/ML architecture patterns: model serving, inference APIs, computer vision pipelines, training pipelines, data augmentation pipelines.

What is the CVSS score for CVE-2022-41886?

CVE-2022-41886 has a CVSS v3.1 base score of 7.5 (HIGH). The EPSS exploitation probability is 0.14%.

Technical Details

NVD Description

TensorFlow is an open source platform for machine learning. When `tf.raw_ops.ImageProjectiveTransformV2` is given a large output shape, it overflows. We have patched the issue in GitHub commit 8faa6ea692985dbe6ce10e1a3168e0bd60a723ba. The fix will be included in TensorFlow 2.11. We will also cherrypick this commit on TensorFlow 2.10.1, 2.9.3, and TensorFlow 2.8.4, as these are also affected and still in supported range.

Exploitation Scenario

An adversary identifies a public-facing image processing API backed by TensorFlow (e.g., a document digitization service, face recognition endpoint, or visual search). They send a crafted POST request with a valid image but specify an extremely large `output_shape` (e.g., [INT_MAX, INT_MAX]) in the transformation parameters. TensorFlow's buffer size calculation overflows, triggering a crash in the serving worker. The attacker repeats this in a loop at low rate to maintain continuous service degradation while evading rate-limit thresholds. In Kubernetes environments without proper liveness probe tuning, this can cause cascading restarts affecting the entire inference tier.

Weaknesses (CWE)

CVSS Vector

CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H

Timeline

Published
November 18, 2022
Last Modified
November 21, 2024
First Seen
November 18, 2022

Related Vulnerabilities