CVE-2022-41909: TensorFlow: remote DoS via malformed tensor input
HIGH PoC AVAILABLE CISA: TRACK*Any TensorFlow serving endpoint that exposes CompositeTensor operations can be crashed remotely with no authentication by sending a malformed tensor—pure availability kill. Patch immediately to TF 2.11, 2.10.1, 2.9.3, or 2.8.4; if patching is blocked, place an API gateway in front that validates tensor types before they reach the raw ops layer. Not actively exploited in the wild, but the bar to exploit is trivially low.
Risk Assessment
High risk for organizations running TensorFlow inference APIs exposed to untrusted networks. CVSS 7.5 reflects network-accessible, zero-auth, zero-interaction exploitation path with full availability impact. The attack requires only sending a crafted invalid CompositeTensorVariant—no ML knowledge needed. Risk is amplified in multi-tenant or public-facing model serving environments where a single crash can deny service to all users. Not in CISA KEV and no evidence of active exploitation reduces immediate urgency, but the trivial exploitability warrants urgent patching during next maintenance window.
Affected Systems
| Package | Ecosystem | Vulnerable Range | Patched |
|---|---|---|---|
| tensorflow | pip | — | No patch |
Do you use tensorflow? You're affected.
Severity & Risk
Attack Surface
Recommended Action
5 steps-
PATCH
Upgrade TensorFlow to 2.11, 2.10.1, 2.9.3, or 2.8.4. Commits bf594d08 and 660ce5a8 contain the fix.
-
VALIDATE
Add input validation at the API boundary—reject requests containing malformed or unexpected tensor types before they reach raw ops. TensorFlow's tf.experimental.ExtensionType validation can help.
-
ISOLATE
Run inference workers as separate processes (not shared) so a crash does not cascade. Use process supervisors (systemd, Kubernetes liveness probes) to auto-restart.
-
RATE-LIMIT: Throttle inference API calls per client to reduce crash-loop DoS surface.
-
DETECT
Alert on unexpected TensorFlow process exits (signal 11 / SIGSEGV). Monitor crash dumps for CompositeTensorVariantToComponents stack frames.
CISA SSVC Assessment
Source: CISA Vulnrichment (SSVC v2.0). Decision based on the CISA Coordinator decision tree.
Classification
Compliance Impact
This CVE is relevant to:
Frequently Asked Questions
What is CVE-2022-41909?
Any TensorFlow serving endpoint that exposes CompositeTensor operations can be crashed remotely with no authentication by sending a malformed tensor—pure availability kill. Patch immediately to TF 2.11, 2.10.1, 2.9.3, or 2.8.4; if patching is blocked, place an API gateway in front that validates tensor types before they reach the raw ops layer. Not actively exploited in the wild, but the bar to exploit is trivially low.
Is CVE-2022-41909 actively exploited?
Proof-of-concept exploit code is publicly available for CVE-2022-41909, increasing the risk of exploitation.
How to fix CVE-2022-41909?
1. PATCH: Upgrade TensorFlow to 2.11, 2.10.1, 2.9.3, or 2.8.4. Commits bf594d08 and 660ce5a8 contain the fix. 2. VALIDATE: Add input validation at the API boundary—reject requests containing malformed or unexpected tensor types before they reach raw ops. TensorFlow's tf.experimental.ExtensionType validation can help. 3. ISOLATE: Run inference workers as separate processes (not shared) so a crash does not cascade. Use process supervisors (systemd, Kubernetes liveness probes) to auto-restart. 4. RATE-LIMIT: Throttle inference API calls per client to reduce crash-loop DoS surface. 5. DETECT: Alert on unexpected TensorFlow process exits (signal 11 / SIGSEGV). Monitor crash dumps for CompositeTensorVariantToComponents stack frames.
What systems are affected by CVE-2022-41909?
This vulnerability affects the following AI/ML architecture patterns: model serving, inference, training pipelines.
What is the CVSS score for CVE-2022-41909?
CVE-2022-41909 has a CVSS v3.1 base score of 7.5 (HIGH). The EPSS exploitation probability is 0.46%.
Technical Details
NVD Description
TensorFlow is an open source platform for machine learning. An input `encoded` that is not a valid `CompositeTensorVariant` tensor will trigger a segfault in `tf.raw_ops.CompositeTensorVariantToComponents`. We have patched the issue in GitHub commits bf594d08d377dc6a3354d9fdb494b32d45f91971 and 660ce5a89eb6766834bdc303d2ab3902aef99d3d. The fix will be included in TensorFlow 2.11. We will also cherrypick this commit on TensorFlow 2.10.1, 2.9.3, and TensorFlow 2.8.4, as these are also affected and still in supported range.
Exploitation Scenario
An adversary identifies a publicly-accessible TensorFlow Serving endpoint (e.g., via Shodan or direct enumeration of ML inference ports). They craft an HTTP request to the prediction API containing a tensor with type=DT_VARIANT but with an invalid or missing CompositeTensorVariant encoding. When TensorFlow attempts to decompose the composite tensor via tf.raw_ops.CompositeTensorVariantToComponents, it dereferences a null pointer and segfaults—crashing the serving process. The adversary scripts this in a loop to prevent auto-recovery, achieving sustained denial of service against the ML inference layer without any credentials or special knowledge.
Weaknesses (CWE)
CVSS Vector
CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H References
- github.com/tensorflow/tensorflow/blob/master/tensorflow/python/lib/core/py_func.cc 3rd Party
- github.com/tensorflow/tensorflow/commit/660ce5a89eb6766834bdc303d2ab3902aef99d3d Patch 3rd Party
- github.com/tensorflow/tensorflow/commit/bf594d08d377dc6a3354d9fdb494b32d45f91971 Patch 3rd Party
- github.com/tensorflow/tensorflow/security/advisories/GHSA-rjx6-v474-2ch9 Exploit Patch 3rd Party
- github.com/ARPSyndicate/cvemon Exploit
- github.com/skipfuzz/skipfuzz Exploit
Timeline
Related Vulnerabilities
CVE-2020-15196 9.9 TensorFlow: heap OOB read in sparse/ragged count ops
Same package: tensorflow CVE-2020-15205 9.8 TensorFlow: heap overflow in StringNGrams, ASLR bypass
Same package: tensorflow CVE-2020-15208 9.8 TFLite: OOB read/write via tensor dimension mismatch
Same package: tensorflow CVE-2019-16778 9.8 TensorFlow: heap overflow in UnsortedSegmentSum op
Same package: tensorflow CVE-2022-23587 9.8 TensorFlow: integer overflow in Grappler enables RCE
Same package: tensorflow
AI Threat Alert