CVE-2023-30767: Intel TF Opt: buffer overflow enables local privesc
MEDIUMIntel's optimized TensorFlow distribution has a buffer overflow enabling local privilege escalation. Primary exposure is on shared ML compute infrastructure — HPC clusters and multi-tenant training nodes — where a low-privileged user could escalate and access other tenants' model weights or training datasets. Patch to Intel Optimization for TensorFlow 2.13.0+ on all shared ML nodes immediately; single-tenant isolated deployments carry lower urgency.
Risk Assessment
Effective risk is moderate-low in isolated single-tenant ML environments but escalates materially on shared training infrastructure. CVSS 6.7 reflects high attack complexity (AC:H) and required user interaction (UI:R), significantly reducing opportunistic exploitation likelihood. No public exploits observed and not in CISA KEV. Primary threat profile is an insider or compromised low-privileged account on a shared ML compute node — a realistic scenario in enterprise data science platforms and cloud-based training clusters.
Affected Systems
| Package | Ecosystem | Vulnerable Range | Patched |
|---|---|---|---|
| optimization_for_tensorflow | pip | — | No patch |
Do you use optimization_for_tensorflow? You're affected.
Severity & Risk
Attack Surface
Recommended Action
6 steps-
Upgrade Intel Optimization for TensorFlow to 2.13.0+ on all training and inference nodes immediately.
-
Inventory all ML infrastructure for Intel-optimized TensorFlow deployments — pay special attention to shared HPC and Kubernetes nodes.
-
Enforce strict namespace and container isolation on multi-tenant ML clusters to limit privilege escalation blast radius.
-
Restrict filesystem permissions on model checkpoint directories and training data stores to principle of least privilege.
-
Monitor for anomalous process spawning from TensorFlow worker processes (unusual child processes, unexpected file access outside workload scope).
-
Consult Intel SA-00903 for official vendor guidance and any additional mitigations.
CISA SSVC Assessment
Source: CISA Vulnrichment (SSVC v2.0). Decision based on the CISA Coordinator decision tree.
Classification
Compliance Impact
This CVE is relevant to:
Frequently Asked Questions
What is CVE-2023-30767?
Intel's optimized TensorFlow distribution has a buffer overflow enabling local privilege escalation. Primary exposure is on shared ML compute infrastructure — HPC clusters and multi-tenant training nodes — where a low-privileged user could escalate and access other tenants' model weights or training datasets. Patch to Intel Optimization for TensorFlow 2.13.0+ on all shared ML nodes immediately; single-tenant isolated deployments carry lower urgency.
Is CVE-2023-30767 actively exploited?
No confirmed active exploitation of CVE-2023-30767 has been reported, but organizations should still patch proactively.
How to fix CVE-2023-30767?
1. Upgrade Intel Optimization for TensorFlow to 2.13.0+ on all training and inference nodes immediately. 2. Inventory all ML infrastructure for Intel-optimized TensorFlow deployments — pay special attention to shared HPC and Kubernetes nodes. 3. Enforce strict namespace and container isolation on multi-tenant ML clusters to limit privilege escalation blast radius. 4. Restrict filesystem permissions on model checkpoint directories and training data stores to principle of least privilege. 5. Monitor for anomalous process spawning from TensorFlow worker processes (unusual child processes, unexpected file access outside workload scope). 6. Consult Intel SA-00903 for official vendor guidance and any additional mitigations.
What systems are affected by CVE-2023-30767?
This vulnerability affects the following AI/ML architecture patterns: training pipelines, model serving, shared ML compute clusters.
What is the CVSS score for CVE-2023-30767?
CVE-2023-30767 has a CVSS v3.1 base score of 6.7 (MEDIUM). The EPSS exploitation probability is 0.07%.
Technical Details
NVD Description
Improper buffer restrictions in Intel(R) Optimization for TensorFlow before version 2.13.0 may allow an authenticated user to potentially enable escalation of privilege via local access.
Exploitation Scenario
A data scientist with a low-privileged account on a shared HPC training node running Intel-optimized TensorFlow triggers the buffer overflow via a crafted input that exploits the improper buffer restrictions during a training operation — requiring interaction from a co-located user (e.g., execution of a shared training script). The memory corruption overwrites security-critical data structures or function pointers within the Intel TF optimization layer, enabling escalation to a higher-privileged process or root. The attacker then pivots to access competing teams' model checkpoints, exfiltrates proprietary training datasets, or injects a backdoored model into a shared registry consumed by downstream production inference pipelines.
Weaknesses (CWE)
CVSS Vector
CVSS:3.1/AV:L/AC:H/PR:L/UI:R/S:U/C:H/I:H/A:H References
Timeline
Related Vulnerabilities
CVE-2020-15196 9.9 TensorFlow: heap OOB read in sparse/ragged count ops
Same package: tensorflow CVE-2020-15205 9.8 TensorFlow: heap overflow in StringNGrams, ASLR bypass
Same package: tensorflow CVE-2020-15208 9.8 TFLite: OOB read/write via tensor dimension mismatch
Same package: tensorflow CVE-2019-16778 9.8 TensorFlow: heap overflow in UnsortedSegmentSum op
Same package: tensorflow CVE-2022-23587 9.8 TensorFlow: integer overflow in Grappler enables RCE
Same package: tensorflow
AI Threat Alert