Skip to main content
Press slash or control plus K to focus the search. Use the arrow keys to navigate results and press enter to open a threat.
Reconnecting to live updates…

CVE-2025-13165: CWE-770 Allocation of Resources Without Limits or Throttling in Digiwin EasyFlow GP

0
High
VulnerabilityCVE-2025-13165cvecve-2025-13165cwe-770
Published: Mon Nov 17 2025 (11/17/2025, 06:46:02 UTC)
Source: CVE Database V5
Vendor/Project: Digiwin
Product: EasyFlow GP

Description

EasyFlow GP developed by Digiwin has a Denial of service vulnerability, allowing unauthenticated remote attackers to send specific requests that result in denial of web service.

AI-Powered Analysis

AILast updated: 11/17/2025, 07:08:15 UTC

Technical Analysis

CVE-2025-13165 is a denial of service (DoS) vulnerability identified in Digiwin's EasyFlow GP product, specifically affecting versions 5.7.x, 5.8.8.3, and 8.1.x. The root cause is an allocation of resources without proper limits or throttling (classified under CWE-770), which allows unauthenticated remote attackers to send specially crafted requests that cause the web service to exhaust its resources and become unavailable. The vulnerability does not require any authentication or user interaction, making it remotely exploitable over the network with low complexity. The CVSS 4.0 vector (AV:N/AC:L/PR:N/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N) indicates network attack vector, no privileges or user interaction needed, and a high impact on availability. While no known exploits have been reported in the wild, the potential for denial of service can disrupt critical business operations relying on EasyFlow GP, which is often used in manufacturing process automation and supply chain management. The lack of patch links suggests that a fix might not yet be publicly available, emphasizing the need for interim mitigations. The vulnerability highlights the importance of resource management and request throttling in web services to prevent exhaustion attacks. Digiwin customers should monitor official advisories and prepare to apply patches once released.

Potential Impact

For European organizations, the primary impact of CVE-2025-13165 is the potential disruption of business-critical services that rely on Digiwin EasyFlow GP for manufacturing automation and supply chain processes. A successful exploitation can lead to denial of service, causing operational downtime, delayed production schedules, and financial losses. This is particularly concerning for industries with just-in-time manufacturing and tightly integrated supply chains prevalent in Europe. Additionally, service outages can damage customer trust and compliance with service level agreements. The vulnerability's unauthenticated and remote exploitability increases the risk of opportunistic attacks from external threat actors. Organizations with insufficient network segmentation or lacking advanced intrusion detection may be more vulnerable. The absence of known exploits currently provides a window for proactive defense, but the high CVSS score indicates that once exploited, the impact on availability is severe. This could also affect third-party service providers and partners using EasyFlow GP, amplifying the disruption across supply networks.

Mitigation Recommendations

1. Implement network-level rate limiting and connection throttling to restrict the number of requests from a single source, reducing the risk of resource exhaustion. 2. Deploy web application firewalls (WAFs) with custom rules to detect and block abnormal request patterns targeting EasyFlow GP endpoints. 3. Monitor server resource usage (CPU, memory, connection counts) in real-time to identify early signs of attack or abnormal load. 4. Segment the network to isolate EasyFlow GP servers from general internet access, allowing only trusted internal or VPN traffic where possible. 5. Engage with Digiwin support to obtain information on patches or updates addressing this vulnerability and plan timely deployment once available. 6. Conduct regular security assessments and penetration testing focused on resource exhaustion scenarios. 7. Maintain up-to-date inventory of affected EasyFlow GP versions and prioritize upgrades to unaffected or patched versions. 8. Educate IT and security teams about the vulnerability specifics to enhance detection and response capabilities. 9. Consider deploying anomaly detection systems that can identify unusual traffic spikes or patterns indicative of exploitation attempts. 10. Establish incident response plans specifically addressing denial of service scenarios impacting EasyFlow GP services.

Need more detailed analysis?Get Pro

Technical Details

Data Version
5.2
Assigner Short Name
twcert
Date Reserved
2025-11-14T03:31:48.841Z
Cvss Version
4.0
State
PUBLISHED

Threat ID: 691ac658848ad39aa203c516

Added to database: 11/17/2025, 6:53:12 AM

Last enriched: 11/17/2025, 7:08:15 AM

Last updated: 11/17/2025, 1:02:19 PM

Views: 13

Community Reviews

0 reviews

Crowdsource mitigation strategies, share intel context, and vote on the most helpful responses. Sign in to add your voice and help keep defenders ahead.

Sort by
Loading community insights…

Want to contribute mitigation steps or threat intel context? Sign in or create an account to join the community discussion.

Actions

PRO

Updates to AI analysis require Pro Console access. Upgrade inside Console → Billing.

Please log in to the Console to use AI analysis features.

Need enhanced features?

Contact root@offseq.com for Pro access with improved analysis and higher rate limits.

Latest Threats