CVE-2022-41891: TensorFlow: segfault DoS in TensorListConcat op
HIGH PoC AVAILABLE CISA: TRACK*Any TensorFlow-based model serving endpoint is remotely crashable with a single malformed request — no authentication required. If your inference infrastructure runs TF < 2.11/2.10.1/2.9.3/2.8.4 and is network-accessible, patch immediately. This is a trivial availability kill-switch for production ML pipelines.
Risk Assessment
High risk for organizations with network-exposed TensorFlow serving endpoints. CVSS 7.5 with AV:N/AC:L/PR:N/UI:N means unauthenticated remote exploitation with near-zero complexity — essentially a one-liner crash trigger. The blast radius is limited to availability (no C/I impact), but in production AI inference contexts, a DoS against model serving equates to direct business disruption. Risk is elevated because TF Serving is commonly exposed internally across large ML platforms without input validation layers.
Affected Systems
| Package | Ecosystem | Vulnerable Range | Patched |
|---|---|---|---|
| tensorflow | pip | — | No patch |
Do you use tensorflow? You're affected.
Severity & Risk
Attack Surface
Recommended Action
5 steps-
Patch: Upgrade to TensorFlow 2.11, 2.10.1, 2.9.3, or 2.8.4 — cherry-pick commit fc33f3dc4c14051a83eec6535b608abe1d355fde if running a custom build.
-
Short-term workaround: Add input validation middleware to inference endpoints that rejects requests with empty element_shape tensors before they reach the TF runtime.
-
Network hardening: Ensure TF Serving is not directly internet-exposed; place behind an API gateway or load balancer that performs basic schema validation.
-
Detection: Monitor for abnormal process restarts or segfault signals in TF Serving logs; alert on SIGSEGV in inference worker processes.
-
Verify: Run
python -c "import tensorflow as tf; print(tf.__version__)"across all inference nodes to confirm patched versions.
CISA SSVC Assessment
Source: CISA Vulnrichment (SSVC v2.0). Decision based on the CISA Coordinator decision tree.
Classification
Compliance Impact
This CVE is relevant to:
Frequently Asked Questions
What is CVE-2022-41891?
Any TensorFlow-based model serving endpoint is remotely crashable with a single malformed request — no authentication required. If your inference infrastructure runs TF < 2.11/2.10.1/2.9.3/2.8.4 and is network-accessible, patch immediately. This is a trivial availability kill-switch for production ML pipelines.
Is CVE-2022-41891 actively exploited?
Proof-of-concept exploit code is publicly available for CVE-2022-41891, increasing the risk of exploitation.
How to fix CVE-2022-41891?
1. Patch: Upgrade to TensorFlow 2.11, 2.10.1, 2.9.3, or 2.8.4 — cherry-pick commit fc33f3dc4c14051a83eec6535b608abe1d355fde if running a custom build. 2. Short-term workaround: Add input validation middleware to inference endpoints that rejects requests with empty element_shape tensors before they reach the TF runtime. 3. Network hardening: Ensure TF Serving is not directly internet-exposed; place behind an API gateway or load balancer that performs basic schema validation. 4. Detection: Monitor for abnormal process restarts or segfault signals in TF Serving logs; alert on SIGSEGV in inference worker processes. 5. Verify: Run `python -c "import tensorflow as tf; print(tf.__version__)"` across all inference nodes to confirm patched versions.
What systems are affected by CVE-2022-41891?
This vulnerability affects the following AI/ML architecture patterns: model serving, training pipelines, inference, batch prediction pipelines.
What is the CVSS score for CVE-2022-41891?
CVE-2022-41891 has a CVSS v3.1 base score of 7.5 (HIGH). The EPSS exploitation probability is 0.18%.
Technical Details
NVD Description
TensorFlow is an open source platform for machine learning. If `tf.raw_ops.TensorListConcat` is given `element_shape=[]`, it results segmentation fault which can be used to trigger a denial of service attack. We have patched the issue in GitHub commit fc33f3dc4c14051a83eec6535b608abe1d355fde. The fix will be included in TensorFlow 2.11. We will also cherrypick this commit on TensorFlow 2.10.1, 2.9.3, and TensorFlow 2.8.4, as these are also affected and still in supported range.
Exploitation Scenario
An adversary identifies a TensorFlow Serving endpoint via passive recon (e.g., exposed gRPC port 8500 or REST port 8501). They craft a PredictRequest invoking a model that uses TensorListConcat — or directly call `tf.raw_ops.TensorListConcat` via a SavedModel with a crafted `element_shape=[]` tensor. The single request triggers a segfault in the TF C++ kernel, crashing the serving process. If the service uses Kubernetes with liveness probes, the pod restarts and the attacker repeats — creating a persistent DoS loop. No credentials, no ML knowledge, no prior access required.
Weaknesses (CWE)
CVSS Vector
CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H References
Timeline
Related Vulnerabilities
CVE-2020-15196 9.9 TensorFlow: heap OOB read in sparse/ragged count ops
Same package: tensorflow CVE-2020-15205 9.8 TensorFlow: heap overflow in StringNGrams, ASLR bypass
Same package: tensorflow CVE-2020-15208 9.8 TFLite: OOB read/write via tensor dimension mismatch
Same package: tensorflow CVE-2019-16778 9.8 TensorFlow: heap overflow in UnsortedSegmentSum op
Same package: tensorflow CVE-2022-23587 9.8 TensorFlow: integer overflow in Grappler enables RCE
Same package: tensorflow
AI Threat Alert