Skip to main content
Press slash or control plus K to focus the search. Use the arrow keys to navigate results and press enter to open a threat.
Reconnecting to live updates…

CVE-2025-55559: n/a

0
High
VulnerabilityCVE-2025-55559cvecve-2025-55559
Published: Thu Sep 25 2025 (09/25/2025, 00:00:00 UTC)
Source: CVE Database V5

Description

An issue was discovered TensorFlow v2.18.0. A Denial of Service (DoS) occurs when padding is set to 'valid' in tf.keras.layers.Conv2D.

AI-Powered Analysis

AILast updated: 10/03/2025, 00:31:19 UTC

Technical Analysis

CVE-2025-55559 is a high-severity vulnerability identified in TensorFlow version 2.18.0, specifically affecting the tf.keras.layers.Conv2D layer when the padding parameter is set to 'valid'. This vulnerability results in a Denial of Service (DoS) condition. The root cause relates to improper handling of input data or internal computations when using the 'valid' padding mode, which likely leads to excessive resource consumption or unhandled exceptions that cause the application or service utilizing this layer to crash or become unresponsive. Since Conv2D is a fundamental building block in convolutional neural networks, widely used in machine learning and AI applications, this vulnerability can impact any system or service that employs TensorFlow 2.18.0 for image processing or related tasks. The CVSS v3.1 base score is 7.5, indicating a high severity level, with an attack vector of network (AV:N), no privileges required (PR:N), no user interaction needed (UI:N), and the impact is solely on availability (A:H) without affecting confidentiality or integrity. The vulnerability is categorized under CWE-400, which corresponds to uncontrolled resource consumption, confirming that the DoS arises from resource exhaustion. No known exploits are currently reported in the wild, and no patches or fixes have been linked yet. This vulnerability could be triggered remotely without authentication, making it a significant risk for exposed services or APIs that process TensorFlow models using the vulnerable Conv2D configuration.

Potential Impact

For European organizations, the impact of CVE-2025-55559 can be substantial, especially for those relying on TensorFlow 2.18.0 in production environments for AI-driven services such as image recognition, autonomous systems, healthcare diagnostics, or any critical infrastructure leveraging machine learning. A successful DoS attack could lead to service outages, disrupting business operations, causing financial losses, and damaging reputation. In sectors like finance, healthcare, and manufacturing, where AI models are increasingly integrated into workflows, availability interruptions could delay critical decision-making or automated processes. Furthermore, organizations offering AI-as-a-service or cloud-based machine learning platforms could face customer dissatisfaction and potential regulatory scrutiny under European data protection and operational resilience regulations. Although the vulnerability does not compromise data confidentiality or integrity, the availability impact alone is significant enough to warrant urgent attention, particularly given the ease of exploitation without authentication or user interaction.

Mitigation Recommendations

To mitigate CVE-2025-55559, European organizations should first identify all deployments using TensorFlow version 2.18.0, especially those utilizing the tf.keras.layers.Conv2D layer with padding set to 'valid'. Until an official patch is released, organizations should consider the following specific actions: 1) Temporarily avoid using the 'valid' padding mode in Conv2D layers or revert to earlier TensorFlow versions not affected by this vulnerability if feasible. 2) Implement rate limiting and input validation on any exposed APIs or services that accept data processed by TensorFlow models to reduce the risk of triggering the DoS condition. 3) Employ robust monitoring and alerting for abnormal resource consumption patterns or service crashes related to TensorFlow processes. 4) Isolate AI/ML workloads in segmented network zones to limit exposure and potential attack surface. 5) Engage with TensorFlow community channels and vendors for timely updates and patches. 6) Conduct thorough testing of AI models and services under load to detect potential DoS triggers proactively. These targeted mitigations go beyond generic advice by focusing on configuration changes, operational controls, and proactive detection tailored to the specifics of this vulnerability.

Need more detailed analysis?Get Pro

Technical Details

Data Version
5.1
Assigner Short Name
mitre
Date Reserved
2025-08-13T00:00:00.000Z
Cvss Version
null
State
PUBLISHED

Threat ID: 68d56205919e15837c9c5a9b

Added to database: 9/25/2025, 3:38:45 PM

Last enriched: 10/3/2025, 12:31:19 AM

Last updated: 11/9/2025, 6:48:29 AM

Views: 67

Community Reviews

0 reviews

Crowdsource mitigation strategies, share intel context, and vote on the most helpful responses. Sign in to add your voice and help keep defenders ahead.

Sort by
Loading community insights…

Want to contribute mitigation steps or threat intel context? Sign in or create an account to join the community discussion.

Actions

PRO

Updates to AI analysis require Pro Console access. Upgrade inside Console → Billing.

Please log in to the Console to use AI analysis features.

Need enhanced features?

Contact root@offseq.com for Pro access with improved analysis and higher rate limits.

Latest Threats