CVE-2025-65891: n/a
CVE-2025-65891 is a vulnerability in OneFlow v0. 9. 0 where improper GPU device-ID validation allows attackers to cause a Denial of Service (DoS) by calling flow. cuda. get_device_properties() with invalid or negative device indices. This flaw can crash or disrupt applications relying on OneFlow’s GPU querying functionality. No known exploits are reported in the wild, and no patches have been published yet. The vulnerability does not require authentication but does require the ability to invoke the affected API. European organizations using OneFlow for GPU-accelerated computing, especially in AI or machine learning workloads, may face service disruptions. Mitigation involves input validation and restricting access to the vulnerable API.
AI Analysis
Technical Summary
CVE-2025-65891 identifies a vulnerability in the OneFlow deep learning framework version 0.9.0, specifically related to GPU device-ID validation. OneFlow provides GPU acceleration capabilities, and the function flow.cuda.get_device_properties() is designed to retrieve properties of a specified GPU device by its index. The vulnerability arises because the function does not properly validate the device index parameter, allowing attackers to supply invalid or negative indices. When such invalid indices are passed, the function triggers a Denial of Service (DoS) condition, likely causing the application or service using OneFlow to crash or become unresponsive. This flaw can be exploited by any user or process capable of invoking this API, without requiring authentication or elevated privileges, but it does require the ability to execute code that calls this function. There are no known exploits in the wild, and no patches or fixes have been released at the time of publication. The vulnerability affects all deployments running OneFlow v0.9.0 that expose or allow access to the vulnerable API. Because OneFlow is used primarily in AI and machine learning workloads that leverage GPU acceleration, this DoS vulnerability could disrupt critical computational tasks, impacting availability. The lack of proper input validation is the root cause, and remediation would involve adding robust checks on the device index parameter to ensure it falls within valid ranges before querying device properties.
Potential Impact
For European organizations, the primary impact of CVE-2025-65891 is availability disruption. Entities relying on OneFlow for GPU-accelerated AI, machine learning, or data processing workloads may experience application crashes or service interruptions if an attacker exploits this vulnerability. This could affect research institutions, technology companies, and enterprises deploying AI models in production environments. Disruptions could delay critical computations, reduce productivity, and potentially impact dependent services or customers. While the vulnerability does not directly compromise confidentiality or integrity, the denial of service could be leveraged as part of a broader attack strategy to degrade operational capabilities. The impact is more pronounced in environments where OneFlow is integrated into automated pipelines or exposed to untrusted users or code execution contexts. Since no known exploits exist yet, the immediate risk is moderate, but the potential for future exploitation remains if the vulnerability is not addressed.
Mitigation Recommendations
To mitigate CVE-2025-65891, organizations should implement strict input validation on any user-supplied or external parameters passed to flow.cuda.get_device_properties(), ensuring device indices are within valid, non-negative ranges and correspond to actual GPU devices present. Restrict access to the OneFlow API to trusted users and processes only, minimizing exposure to untrusted code execution that could invoke the vulnerable function. Monitor application logs for abnormal calls to get_device_properties() with invalid indices, which may indicate attempted exploitation. Where possible, isolate GPU-accelerated workloads in secure environments with limited external access. Engage with OneFlow maintainers or community to track patch releases and apply updates promptly once available. As a temporary workaround, consider disabling or restricting the use of the vulnerable API if feasible. Additionally, implement robust error handling in applications using OneFlow to gracefully manage unexpected failures and prevent cascading service disruptions.
Affected Countries
Germany, France, United Kingdom, Netherlands, Sweden, Finland, Switzerland
CVE-2025-65891: n/a
Description
CVE-2025-65891 is a vulnerability in OneFlow v0. 9. 0 where improper GPU device-ID validation allows attackers to cause a Denial of Service (DoS) by calling flow. cuda. get_device_properties() with invalid or negative device indices. This flaw can crash or disrupt applications relying on OneFlow’s GPU querying functionality. No known exploits are reported in the wild, and no patches have been published yet. The vulnerability does not require authentication but does require the ability to invoke the affected API. European organizations using OneFlow for GPU-accelerated computing, especially in AI or machine learning workloads, may face service disruptions. Mitigation involves input validation and restricting access to the vulnerable API.
AI-Powered Analysis
Technical Analysis
CVE-2025-65891 identifies a vulnerability in the OneFlow deep learning framework version 0.9.0, specifically related to GPU device-ID validation. OneFlow provides GPU acceleration capabilities, and the function flow.cuda.get_device_properties() is designed to retrieve properties of a specified GPU device by its index. The vulnerability arises because the function does not properly validate the device index parameter, allowing attackers to supply invalid or negative indices. When such invalid indices are passed, the function triggers a Denial of Service (DoS) condition, likely causing the application or service using OneFlow to crash or become unresponsive. This flaw can be exploited by any user or process capable of invoking this API, without requiring authentication or elevated privileges, but it does require the ability to execute code that calls this function. There are no known exploits in the wild, and no patches or fixes have been released at the time of publication. The vulnerability affects all deployments running OneFlow v0.9.0 that expose or allow access to the vulnerable API. Because OneFlow is used primarily in AI and machine learning workloads that leverage GPU acceleration, this DoS vulnerability could disrupt critical computational tasks, impacting availability. The lack of proper input validation is the root cause, and remediation would involve adding robust checks on the device index parameter to ensure it falls within valid ranges before querying device properties.
Potential Impact
For European organizations, the primary impact of CVE-2025-65891 is availability disruption. Entities relying on OneFlow for GPU-accelerated AI, machine learning, or data processing workloads may experience application crashes or service interruptions if an attacker exploits this vulnerability. This could affect research institutions, technology companies, and enterprises deploying AI models in production environments. Disruptions could delay critical computations, reduce productivity, and potentially impact dependent services or customers. While the vulnerability does not directly compromise confidentiality or integrity, the denial of service could be leveraged as part of a broader attack strategy to degrade operational capabilities. The impact is more pronounced in environments where OneFlow is integrated into automated pipelines or exposed to untrusted users or code execution contexts. Since no known exploits exist yet, the immediate risk is moderate, but the potential for future exploitation remains if the vulnerability is not addressed.
Mitigation Recommendations
To mitigate CVE-2025-65891, organizations should implement strict input validation on any user-supplied or external parameters passed to flow.cuda.get_device_properties(), ensuring device indices are within valid, non-negative ranges and correspond to actual GPU devices present. Restrict access to the OneFlow API to trusted users and processes only, minimizing exposure to untrusted code execution that could invoke the vulnerable function. Monitor application logs for abnormal calls to get_device_properties() with invalid indices, which may indicate attempted exploitation. Where possible, isolate GPU-accelerated workloads in secure environments with limited external access. Engage with OneFlow maintainers or community to track patch releases and apply updates promptly once available. As a temporary workaround, consider disabling or restricting the use of the vulnerable API if feasible. Additionally, implement robust error handling in applications using OneFlow to gracefully manage unexpected failures and prevent cascading service disruptions.
Affected Countries
Technical Details
- Data Version
- 5.2
- Assigner Short Name
- mitre
- Date Reserved
- 2025-11-18T00:00:00.000Z
- Cvss Version
- null
- State
- PUBLISHED
Threat ID: 697a48fd4623b1157cdca046
Added to database: 1/28/2026, 5:35:57 PM
Last enriched: 1/28/2026, 5:50:30 PM
Last updated: 1/28/2026, 6:51:08 PM
Views: 3
Community Reviews
0 reviewsCrowdsource mitigation strategies, share intel context, and vote on the most helpful responses. Sign in to add your voice and help keep defenders ahead.
Want to contribute mitigation steps or threat intel context? Sign in or create an account to join the community discussion.
Related Threats
CVE-2026-24775: CWE-345: Insufficient Verification of Data Authenticity in opf openproject
MediumCVE-2026-24772: CWE-345: Insufficient Verification of Data Authenticity in opf openproject
HighCVE-2025-71001: n/a
MediumCVE-2025-71000: n/a
HighCVE-2025-57796: CWE-257:Storing Passwords in a Recoverable Format in Explorance Blue
MediumActions
Updates to AI analysis require Pro Console access. Upgrade inside Console → Billing.
Need more coverage?
Upgrade to Pro Console in Console -> Billing for AI refresh and higher limits.
For incident response and remediation, OffSeq services can help resolve threats faster.