Skip to main content

CVE-2025-0649: CWE-121 in Google Tensorflow

High
VulnerabilityCVE-2025-0649cvecve-2025-0649cwe-121
Published: Tue May 06 2025 (05/06/2025, 20:20:02 UTC)
Source: CVE
Vendor/Project: Google
Product: Tensorflow

Description

Incorrect JSON input stringification in Google's Tensorflow serving versions up to 2.18.0 allows for potentially unbounded recursion leading to server crash.

AI-Powered Analysis

AILast updated: 07/05/2025, 16:09:35 UTC

Technical Analysis

CVE-2025-0649 is a high-severity vulnerability identified in Google's Tensorflow Serving software, specifically affecting versions up to 2.18.0. The root cause is an incorrect handling of JSON input stringification, which can trigger potentially unbounded recursion. This flaw is categorized under CWE-121, which typically refers to stack-based buffer overflows, but here it manifests as uncontrolled recursion leading to a server crash, effectively a denial-of-service (DoS) condition. The vulnerability allows an unauthenticated attacker to send specially crafted JSON input to the Tensorflow Serving API, causing the server process to exhaust its stack or memory resources and crash. The CVSS 4.0 base score is 8.9, reflecting a high impact due to network attack vector (AV:N), low attack complexity (AC:L), no user interaction (UI:N), and no privileges required (PR:N). The vulnerability does not compromise confidentiality, integrity, or availability beyond causing service disruption (availability impact is high). No known exploits are currently reported in the wild, and no patches have been linked yet, indicating that mitigation may require vendor updates or workarounds. Tensorflow Serving is widely used in machine learning model deployment environments, including cloud services and on-premises AI infrastructure, making this vulnerability relevant to organizations relying on Tensorflow for production AI workloads. The flaw could be exploited remotely without authentication, making it a critical operational risk for any exposed Tensorflow Serving endpoints.

Potential Impact

For European organizations, the impact of CVE-2025-0649 could be significant, especially those heavily invested in AI and machine learning infrastructure using Tensorflow Serving. The vulnerability can cause denial-of-service conditions, leading to downtime of AI model serving capabilities. This disruption can affect critical business functions such as automated decision-making, customer-facing AI services, and real-time analytics. Industries such as finance, healthcare, automotive, and telecommunications, which increasingly rely on AI models for operational efficiency and innovation, could face service interruptions and potential financial losses. Additionally, organizations providing AI services or cloud hosting in Europe may see reputational damage if their services become unavailable due to exploitation of this vulnerability. Since the attack requires no authentication and no user interaction, any publicly accessible Tensorflow Serving instance is at risk. The lack of current exploits in the wild provides a window for proactive mitigation, but the high severity score underscores the urgency for European entities to address this vulnerability promptly.

Mitigation Recommendations

Given the absence of an official patch at the time of this report, European organizations should implement immediate mitigations to reduce exposure. First, restrict network access to Tensorflow Serving endpoints by implementing strict firewall rules and network segmentation, allowing only trusted internal systems to communicate with the service. Second, deploy Web Application Firewalls (WAFs) or API gateways with custom rules to detect and block anomalous or malformed JSON payloads that could trigger the recursion flaw. Third, monitor Tensorflow Serving logs and system metrics for signs of abnormal recursion or resource exhaustion, enabling early detection of attempted exploitation. Fourth, consider temporarily disabling or limiting public exposure of Tensorflow Serving APIs until a vendor patch is available. Finally, maintain close communication with Google and subscribe to security advisories for prompt application of patches once released. For long-term resilience, organizations should adopt defense-in-depth strategies including input validation, rate limiting, and redundancy in AI serving infrastructure to minimize the impact of potential DoS attacks.

Need more detailed analysis?Get Pro

Technical Details

Data Version
5.1
Assigner Short Name
Google
Date Reserved
2025-01-22T15:18:16.136Z
Cisa Enriched
true
Cvss Version
4.0
State
PUBLISHED

Threat ID: 682d981bc4522896dcbd9db0

Added to database: 5/21/2025, 9:08:43 AM

Last enriched: 7/5/2025, 4:09:35 PM

Last updated: 8/17/2025, 10:25:52 AM

Views: 21

Actions

PRO

Updates to AI analysis are available only with a Pro account. Contact root@offseq.com for access.

Please log in to the Console to use AI analysis features.

Need enhanced features?

Contact root@offseq.com for Pro access with improved analysis and higher rate limits.

Latest Threats