Skip to main content
Press slash or control plus K to focus the search. Use the arrow keys to navigate results and press enter to open a threat.
Reconnecting to live updates…

CVE-2025-65887: n/a

0
Medium
VulnerabilityCVE-2025-65887cvecve-2025-65887
Published: Wed Jan 28 2026 (01/28/2026, 00:00:00 UTC)
Source: CVE Database V5

Description

CVE-2025-65887 is a medium-severity vulnerability in OneFlow v0. 9. 0 where a division-by-zero error in the flow. floor_divide() function can be triggered by a crafted input tensor containing zero. This flaw allows unauthenticated attackers to cause a Denial of Service (DoS) by crashing or halting the application using OneFlow. The vulnerability does not impact confidentiality or integrity but affects availability. Exploitation requires user interaction to supply the malicious input tensor. No known exploits are currently reported in the wild. European organizations using OneFlow for machine learning workloads may experience service disruptions if targeted. Mitigation involves input validation and patching once updates are available.

AI-Powered Analysis

AILast updated: 02/05/2026, 09:04:08 UTC

Technical Analysis

CVE-2025-65887 identifies a division-by-zero vulnerability in the flow.floor_divide() component of OneFlow version 0.9.0, a machine learning framework. The flaw arises when the function attempts to perform floor division on an input tensor that contains zero, leading to an unhandled division-by-zero exception. This causes the application to crash or become unresponsive, resulting in a Denial of Service (DoS) condition. The vulnerability can be triggered remotely without requiring privileges, but it does require user interaction to supply the crafted input tensor. The CVSS score of 6.5 reflects a medium severity, emphasizing the impact on availability without compromising confidentiality or integrity. No patches or fixes are currently linked, and no known exploits have been reported in the wild. The vulnerability primarily affects systems running OneFlow v0.9.0, which is used in AI and machine learning workflows. Attackers could exploit this flaw to disrupt services, degrade system reliability, or cause downtime in environments relying on OneFlow for critical processing tasks.

Potential Impact

For European organizations, the primary impact is service disruption due to Denial of Service attacks targeting OneFlow-based applications. This can affect AI research labs, data science teams, and enterprises leveraging OneFlow for machine learning model training and inference. Disruptions could delay project timelines, reduce productivity, and potentially cause financial losses if critical systems become unavailable. Since the vulnerability does not affect data confidentiality or integrity, the risk of data breaches is low. However, availability issues can impact sectors relying on real-time or high-availability AI services, such as healthcare, finance, and manufacturing. Organizations with automated pipelines or cloud-based AI services using OneFlow may experience cascading failures if the vulnerability is exploited.

Mitigation Recommendations

To mitigate this vulnerability, organizations should implement strict input validation to ensure that tensors passed to flow.floor_divide() do not contain zero values that could trigger division-by-zero errors. Developers should add exception handling around floor division operations to gracefully manage unexpected inputs. Monitoring and logging should be enhanced to detect abnormal crashes or service interruptions related to OneFlow processes. Organizations should stay alert for official patches or updates from the OneFlow development team and apply them promptly once available. In the interim, restricting access to systems running OneFlow and limiting exposure to untrusted inputs can reduce exploitation risk. Additionally, sandboxing or containerizing OneFlow workloads can help contain potential DoS impacts. Regular backups and failover mechanisms should be tested to maintain service continuity.

Need more detailed analysis?Upgrade to Pro Console

Technical Details

Data Version
5.2
Assigner Short Name
mitre
Date Reserved
2025-11-18T00:00:00.000Z
Cvss Version
null
State
PUBLISHED

Threat ID: 697a3aee4623b1157cd881c1

Added to database: 1/28/2026, 4:35:58 PM

Last enriched: 2/5/2026, 9:04:08 AM

Last updated: 2/7/2026, 8:35:57 AM

Views: 18

Community Reviews

0 reviews

Crowdsource mitigation strategies, share intel context, and vote on the most helpful responses. Sign in to add your voice and help keep defenders ahead.

Sort by
Loading community insights…

Want to contribute mitigation steps or threat intel context? Sign in or create an account to join the community discussion.

Actions

PRO

Updates to AI analysis require Pro Console access. Upgrade inside Console → Billing.

Please log in to the Console to use AI analysis features.

Need more coverage?

Upgrade to Pro Console in Console -> Billing for AI refresh and higher limits.

For incident response and remediation, OffSeq services can help resolve threats faster.

Latest Threats