Skip to main content
Press slash or control plus K to focus the search. Use the arrow keys to navigate results and press enter to open a threat.
Reconnecting to live updates…

CVE-2025-13165: CWE-770 Allocation of Resources Without Limits or Throttling in Digiwin EasyFlow GP

0
High
VulnerabilityCVE-2025-13165cvecve-2025-13165cwe-770
Published: Mon Nov 17 2025 (11/17/2025, 06:46:02 UTC)
Source: CVE Database V5
Vendor/Project: Digiwin
Product: EasyFlow GP

Description

EasyFlow GP developed by Digiwin has a Denial of service vulnerability, allowing unauthenticated remote attackers to send specific requests that result in denial of web service.

AI-Powered Analysis

AILast updated: 11/24/2025, 07:08:40 UTC

Technical Analysis

CVE-2025-13165 identifies a denial of service (DoS) vulnerability in Digiwin's EasyFlow GP product, specifically in versions 5.7.x, 5.8.8.3, and 8.1.x. The root cause is an allocation of resources without proper limits or throttling, classified under CWE-770. This flaw allows unauthenticated remote attackers to send specially crafted requests that cause the application to consume excessive resources, leading to a denial of web service. The vulnerability does not require any authentication or user interaction, making it easily exploitable remotely. The CVSS 4.0 vector (AV:N/AC:L/AT:N/PR:N/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N) reflects a network attack vector with low complexity, no privileges or user interaction needed, and a high impact on availability. Although no public exploits have been reported, the high CVSS score (8.7) indicates a critical risk to service continuity. Digiwin EasyFlow GP is used in enterprise environments for workflow and process automation, so disruption could impact business operations. The lack of patch links suggests that a fix may not yet be available, emphasizing the need for interim mitigations. The vulnerability's technical details confirm it was reserved and published in November 2025 by TW-CERT, indicating credible and verified reporting.

Potential Impact

For European organizations, exploitation of CVE-2025-13165 could result in significant denial of service conditions, disrupting critical business workflows and automated processes managed by EasyFlow GP. This can lead to operational downtime, loss of productivity, and potential financial losses. Organizations in sectors such as manufacturing, logistics, and enterprise IT that rely on Digiwin EasyFlow GP for process automation are particularly vulnerable. The unauthenticated nature of the attack increases the risk of widespread exploitation, including by opportunistic attackers or competitors. Additionally, service outages could indirectly affect supply chains and customer-facing services, amplifying the impact. The lack of known exploits currently provides a window for proactive defense, but the high CVSS score and ease of exploitation underscore the urgency. European entities with regulatory requirements for service availability and incident reporting may face compliance challenges if affected.

Mitigation Recommendations

Given the absence of an official patch, European organizations should implement immediate compensating controls. First, deploy network-level rate limiting and traffic shaping to restrict the volume of requests to EasyFlow GP endpoints, preventing resource exhaustion. Second, configure web application firewalls (WAFs) with custom rules to detect and block anomalous or malformed requests targeting the vulnerable functionality. Third, monitor network and application logs for unusual spikes in traffic or repeated request patterns indicative of exploitation attempts. Fourth, isolate EasyFlow GP servers behind segmented network zones with strict access controls to reduce exposure. Fifth, engage with Digiwin support to obtain any available hotfixes or guidance and plan for timely patch deployment once available. Finally, conduct internal awareness and incident response drills to prepare for potential DoS incidents related to this vulnerability.

Need more detailed analysis?Upgrade to Pro Console

Technical Details

Data Version
5.2
Assigner Short Name
twcert
Date Reserved
2025-11-14T03:31:48.841Z
Cvss Version
4.0
State
PUBLISHED

Threat ID: 691ac658848ad39aa203c516

Added to database: 11/17/2025, 6:53:12 AM

Last enriched: 11/24/2025, 7:08:40 AM

Last updated: 1/7/2026, 7:32:03 AM

Views: 83

Community Reviews

0 reviews

Crowdsource mitigation strategies, share intel context, and vote on the most helpful responses. Sign in to add your voice and help keep defenders ahead.

Sort by
Loading community insights…

Want to contribute mitigation steps or threat intel context? Sign in or create an account to join the community discussion.

Actions

PRO

Updates to AI analysis require Pro Console access. Upgrade inside Console → Billing.

Please log in to the Console to use AI analysis features.

Need more coverage?

Upgrade to Pro Console in Console -> Billing for AI refresh and higher limits.

For incident response and remediation, OffSeq services can help resolve threats faster.

Latest Threats