CVE-2022-41897: TensorFlow: OOB read in FractionMaxPoolGrad causes DoS
HIGH PoC AVAILABLE CISA: TRACK*A network-reachable, zero-auth crash in TensorFlow's fractional max pooling gradient allows any attacker to bring down TF-based serving infrastructure by sending oversized sequence inputs. Upgrade to TensorFlow 2.11, 2.10.1, 2.9.3, or 2.8.4 immediately. If patching is blocked, add input size validation at the API gateway layer to reject abnormally large pooling sequence arrays.
Risk Assessment
High exploitability: CVSS 7.5 with AV:N/AC:L/PR:N/UI:N means any unauthenticated attacker on the network can trigger this with a single crafted request. Impact is limited to availability (no confidentiality or integrity loss), but a persistent crash loop against a production ML serving endpoint constitutes a full service outage. Not in CISA KEV and no active exploitation evidence as of disclosure, but the GitHub advisory is tagged 'Exploit', suggesting PoC exists. Risk is highest for organizations exposing TensorFlow inference or training APIs directly to untrusted networks.
Affected Systems
| Package | Ecosystem | Vulnerable Range | Patched |
|---|---|---|---|
| tensorflow | pip | — | No patch |
Do you use tensorflow? You're affected.
Severity & Risk
Attack Surface
Recommended Action
5 steps-
PATCH
Upgrade to TensorFlow 2.11.0, 2.10.1, 2.9.3, or 2.8.4. Apply commit d71090c3e5ca325bdf4b02eb236cfb3ee823e927 if building from source.
-
WORKAROUND
Add server-side validation to reject requests where row_pooling_sequence or col_pooling_sequence exceed expected bounds before reaching TF ops.
-
HARDEN
Place TF Serving behind an API gateway that enforces payload size limits and schema validation on tensor inputs.
-
ISOLATE
Ensure model training and serving processes run with minimal privileges and in containerized environments to limit blast radius of a crash.
-
DETECT
Alert on unexpected TensorFlow process exits or restart loops — these are the primary exploitation signal.
CISA SSVC Assessment
Source: CISA Vulnrichment (SSVC v2.0). Decision based on the CISA Coordinator decision tree.
Classification
Compliance Impact
This CVE is relevant to:
Frequently Asked Questions
What is CVE-2022-41897?
A network-reachable, zero-auth crash in TensorFlow's fractional max pooling gradient allows any attacker to bring down TF-based serving infrastructure by sending oversized sequence inputs. Upgrade to TensorFlow 2.11, 2.10.1, 2.9.3, or 2.8.4 immediately. If patching is blocked, add input size validation at the API gateway layer to reject abnormally large pooling sequence arrays.
Is CVE-2022-41897 actively exploited?
Proof-of-concept exploit code is publicly available for CVE-2022-41897, increasing the risk of exploitation.
How to fix CVE-2022-41897?
1. PATCH: Upgrade to TensorFlow 2.11.0, 2.10.1, 2.9.3, or 2.8.4. Apply commit d71090c3e5ca325bdf4b02eb236cfb3ee823e927 if building from source. 2. WORKAROUND: Add server-side validation to reject requests where row_pooling_sequence or col_pooling_sequence exceed expected bounds before reaching TF ops. 3. HARDEN: Place TF Serving behind an API gateway that enforces payload size limits and schema validation on tensor inputs. 4. ISOLATE: Ensure model training and serving processes run with minimal privileges and in containerized environments to limit blast radius of a crash. 5. DETECT: Alert on unexpected TensorFlow process exits or restart loops — these are the primary exploitation signal.
What systems are affected by CVE-2022-41897?
This vulnerability affects the following AI/ML architecture patterns: training pipelines, model serving, inference endpoints.
What is the CVSS score for CVE-2022-41897?
CVE-2022-41897 has a CVSS v3.1 base score of 7.5 (HIGH). The EPSS exploitation probability is 0.14%.
Technical Details
NVD Description
TensorFlow is an open source platform for machine learning. If `FractionMaxPoolGrad` is given outsize inputs `row_pooling_sequence` and `col_pooling_sequence`, TensorFlow will crash. We have patched the issue in GitHub commit d71090c3e5ca325bdf4b02eb236cfb3ee823e927. The fix will be included in TensorFlow 2.11. We will also cherrypick this commit on TensorFlow 2.10.1, 2.9.3, and TensorFlow 2.8.4, as these are also affected and still in supported range.
Exploitation Scenario
An attacker identifies a publicly accessible TensorFlow Serving endpoint or a training API (e.g., custom training loop exposed via REST). They craft a request invoking FractionMaxPoolGrad with row_pooling_sequence or col_pooling_sequence arrays whose dimensions exceed the expected bounds. TensorFlow performs an out-of-bounds read (CWE-125) during the gradient computation, causing an immediate process crash. In an autoscaling environment, repeated requests can outpace the restart policy, resulting in sustained unavailability. In a single-node training environment, the attack terminates an active training job, destroying ephemeral checkpoint state if not persisted. No ML knowledge is required — the attacker only needs to know the API accepts pooling gradient operations.
Weaknesses (CWE)
CVSS Vector
CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H References
Timeline
Related Vulnerabilities
CVE-2020-15196 9.9 TensorFlow: heap OOB read in sparse/ragged count ops
Same package: tensorflow CVE-2020-15205 9.8 TensorFlow: heap overflow in StringNGrams, ASLR bypass
Same package: tensorflow CVE-2020-15208 9.8 TFLite: OOB read/write via tensor dimension mismatch
Same package: tensorflow CVE-2019-16778 9.8 TensorFlow: heap overflow in UnsortedSegmentSum op
Same package: tensorflow CVE-2022-23587 9.8 TensorFlow: integer overflow in Grappler enables RCE
Same package: tensorflow
AI Threat Alert