CVE-2025-65891: n/a
CVE-2025-65891 is a high-severity vulnerability in OneFlow v0. 9. 0 caused by improper GPU device-ID validation. Attackers can trigger a Denial of Service (DoS) by calling flow. cuda. get_device_properties() with an invalid or negative device index, causing resource exhaustion or application crashes. This flaw does not require authentication or user interaction and can be exploited remotely over the network. The vulnerability impacts availability but does not affect confidentiality or integrity. No known exploits are currently in the wild, and no patches have been released yet. European organizations using OneFlow for GPU-accelerated computing are at risk of service disruption.
AI Analysis
Technical Summary
CVE-2025-65891 is a vulnerability identified in OneFlow version 0.9.0, a machine learning framework that supports GPU acceleration. The flaw arises from inadequate validation of GPU device identifiers within the flow.cuda.get_device_properties() function. Specifically, the function fails to properly check if the device index provided is valid or non-negative. An attacker can exploit this by invoking the function with an invalid or negative device index, which leads to a Denial of Service (DoS) condition. This DoS can manifest as application crashes or resource exhaustion on the host system managing the GPU resources. The vulnerability is classified under CWE-400 (Uncontrolled Resource Consumption), indicating that the flaw allows attackers to consume excessive resources, thereby degrading system availability. The CVSS v3.1 base score is 7.5, with vector AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H, meaning the attack can be launched remotely over the network without any privileges or user interaction, and it impacts availability only. No patches or fixes have been published at the time of disclosure, and no known exploits are reported in the wild. This vulnerability is significant for environments relying on OneFlow for GPU-based computations, as it can disrupt critical AI workloads and services.
Potential Impact
For European organizations, the primary impact of CVE-2025-65891 is the potential disruption of AI and high-performance computing (HPC) workloads that depend on OneFlow’s GPU acceleration capabilities. This can lead to service outages, delayed data processing, and operational downtime, affecting sectors such as research institutions, financial services, automotive industries, and technology companies heavily invested in AI development. The DoS condition could also affect cloud service providers hosting GPU-accelerated applications, leading to broader service degradation. Since the vulnerability does not compromise confidentiality or integrity, data breaches are unlikely; however, the availability impact can cause significant business interruptions and financial losses. Organizations with GPU clusters used for machine learning training or inference are particularly vulnerable, as attackers can remotely trigger the DoS without authentication, increasing the risk of widespread disruption.
Mitigation Recommendations
To mitigate CVE-2025-65891, organizations should implement strict input validation on GPU device indices before invoking flow.cuda.get_device_properties() to ensure only valid, non-negative device IDs are processed. Restrict access to GPU management APIs to trusted users and services only, employing network segmentation and access control lists to limit exposure. Monitor application logs and GPU usage metrics for abnormal API calls or unexpected crashes that may indicate exploitation attempts. Where possible, isolate GPU workloads in containerized or virtualized environments to contain potential DoS effects. Engage with OneFlow developers or community to obtain patches or updates addressing this vulnerability as soon as they become available. Additionally, consider fallback mechanisms or redundancy in GPU resources to maintain service continuity during potential DoS events. Finally, educate developers and system administrators about this vulnerability to ensure secure coding and operational practices around GPU resource management.
Affected Countries
Germany, France, Netherlands, United Kingdom, Sweden, Finland
CVE-2025-65891: n/a
Description
CVE-2025-65891 is a high-severity vulnerability in OneFlow v0. 9. 0 caused by improper GPU device-ID validation. Attackers can trigger a Denial of Service (DoS) by calling flow. cuda. get_device_properties() with an invalid or negative device index, causing resource exhaustion or application crashes. This flaw does not require authentication or user interaction and can be exploited remotely over the network. The vulnerability impacts availability but does not affect confidentiality or integrity. No known exploits are currently in the wild, and no patches have been released yet. European organizations using OneFlow for GPU-accelerated computing are at risk of service disruption.
AI-Powered Analysis
Technical Analysis
CVE-2025-65891 is a vulnerability identified in OneFlow version 0.9.0, a machine learning framework that supports GPU acceleration. The flaw arises from inadequate validation of GPU device identifiers within the flow.cuda.get_device_properties() function. Specifically, the function fails to properly check if the device index provided is valid or non-negative. An attacker can exploit this by invoking the function with an invalid or negative device index, which leads to a Denial of Service (DoS) condition. This DoS can manifest as application crashes or resource exhaustion on the host system managing the GPU resources. The vulnerability is classified under CWE-400 (Uncontrolled Resource Consumption), indicating that the flaw allows attackers to consume excessive resources, thereby degrading system availability. The CVSS v3.1 base score is 7.5, with vector AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H, meaning the attack can be launched remotely over the network without any privileges or user interaction, and it impacts availability only. No patches or fixes have been published at the time of disclosure, and no known exploits are reported in the wild. This vulnerability is significant for environments relying on OneFlow for GPU-based computations, as it can disrupt critical AI workloads and services.
Potential Impact
For European organizations, the primary impact of CVE-2025-65891 is the potential disruption of AI and high-performance computing (HPC) workloads that depend on OneFlow’s GPU acceleration capabilities. This can lead to service outages, delayed data processing, and operational downtime, affecting sectors such as research institutions, financial services, automotive industries, and technology companies heavily invested in AI development. The DoS condition could also affect cloud service providers hosting GPU-accelerated applications, leading to broader service degradation. Since the vulnerability does not compromise confidentiality or integrity, data breaches are unlikely; however, the availability impact can cause significant business interruptions and financial losses. Organizations with GPU clusters used for machine learning training or inference are particularly vulnerable, as attackers can remotely trigger the DoS without authentication, increasing the risk of widespread disruption.
Mitigation Recommendations
To mitigate CVE-2025-65891, organizations should implement strict input validation on GPU device indices before invoking flow.cuda.get_device_properties() to ensure only valid, non-negative device IDs are processed. Restrict access to GPU management APIs to trusted users and services only, employing network segmentation and access control lists to limit exposure. Monitor application logs and GPU usage metrics for abnormal API calls or unexpected crashes that may indicate exploitation attempts. Where possible, isolate GPU workloads in containerized or virtualized environments to contain potential DoS effects. Engage with OneFlow developers or community to obtain patches or updates addressing this vulnerability as soon as they become available. Additionally, consider fallback mechanisms or redundancy in GPU resources to maintain service continuity during potential DoS events. Finally, educate developers and system administrators about this vulnerability to ensure secure coding and operational practices around GPU resource management.
Affected Countries
Technical Details
- Data Version
- 5.2
- Assigner Short Name
- mitre
- Date Reserved
- 2025-11-18T00:00:00.000Z
- Cvss Version
- null
- State
- PUBLISHED
Threat ID: 697a48fd4623b1157cdca046
Added to database: 1/28/2026, 5:35:57 PM
Last enriched: 2/5/2026, 8:57:45 AM
Last updated: 2/7/2026, 1:03:58 AM
Views: 18
Community Reviews
0 reviewsCrowdsource mitigation strategies, share intel context, and vote on the most helpful responses. Sign in to add your voice and help keep defenders ahead.
Want to contribute mitigation steps or threat intel context? Sign in or create an account to join the community discussion.
Related Threats
CVE-2026-2071: Buffer Overflow in UTT 进取 520W
HighCVE-2026-25762: CWE-400: Uncontrolled Resource Consumption in adonisjs core
HighCVE-2026-25754: CWE-1321: Improperly Controlled Modification of Object Prototype Attributes ('Prototype Pollution') in adonisjs core
HighCVE-2026-25644: CWE-295: Improper Certificate Validation in datahub-project datahub
HighCVE-2026-25804: CWE-287: Improper Authentication in antrea-io antrea
HighActions
Updates to AI analysis require Pro Console access. Upgrade inside Console → Billing.
Need more coverage?
Upgrade to Pro Console in Console -> Billing for AI refresh and higher limits.
For incident response and remediation, OffSeq services can help resolve threats faster.