Skip to main content
Press slash or control plus K to focus the search. Use the arrow keys to navigate results and press enter to open a threat.
Reconnecting to live updates…

CVE-2025-70999: n/a

0
High
VulnerabilityCVE-2025-70999cvecve-2025-70999
Published: Wed Jan 28 2026 (01/28/2026, 00:00:00 UTC)
Source: CVE Database V5

Description

CVE-2025-70999 is a high-severity vulnerability in OneFlow v0. 9. 0 affecting the flow. cuda. get_device_capability() function. The flaw arises from improper validation of GPU device IDs, allowing an attacker to supply a crafted device ID that triggers a Denial of Service (DoS) condition. This vulnerability requires no authentication or user interaction and can be exploited remotely over the network. The impact is limited to availability, causing service disruption without compromising confidentiality or integrity. No known exploits are currently reported in the wild. European organizations using OneFlow for GPU-accelerated computing, particularly in AI or data processing workloads, are at risk.

AI-Powered Analysis

AILast updated: 02/05/2026, 08:58:04 UTC

Technical Analysis

CVE-2025-70999 identifies a vulnerability in the OneFlow deep learning framework version 0.9.0, specifically within the flow.cuda.get_device_capability() component. This function is responsible for querying the capabilities of GPU devices by their device IDs. The vulnerability stems from insufficient validation of the device ID input, allowing an attacker to supply a specially crafted device ID that the system cannot properly handle. This leads to resource exhaustion or other failure modes that cause a Denial of Service (DoS), effectively disrupting the availability of the OneFlow service or application relying on it. The CVSS v3.1 base score is 7.5, indicating a high severity level, with an attack vector of network (AV:N), low attack complexity (AC:L), no privileges required (PR:N), no user interaction (UI:N), and an impact limited to availability (A:H) without affecting confidentiality or integrity. The vulnerability is categorized under CWE-400 (Uncontrolled Resource Consumption), highlighting that the flaw allows attackers to consume resources excessively, leading to service degradation or crash. No patches or exploits are currently publicly available, but the flaw poses a significant risk to environments using OneFlow for GPU-accelerated tasks, especially in AI and machine learning domains. The lack of authentication requirements and user interaction makes this vulnerability easier to exploit remotely, increasing its threat potential.

Potential Impact

For European organizations, the primary impact of CVE-2025-70999 is the potential disruption of services relying on OneFlow for GPU-accelerated computing tasks. This can affect AI research institutions, data centers, and enterprises utilizing OneFlow in production environments, leading to downtime and loss of productivity. The denial of service could interrupt critical workflows, delay data processing, and impact dependent applications. Since the vulnerability does not affect confidentiality or integrity, data breaches or manipulation are not a direct concern. However, service unavailability can have cascading effects, such as missed deadlines, reduced operational efficiency, and reputational damage. Organizations in sectors heavily invested in AI and machine learning, including automotive, finance, healthcare, and academia, may experience operational setbacks. Additionally, cloud service providers hosting OneFlow workloads could face customer impact and SLA violations. The absence of known exploits reduces immediate risk but does not eliminate the threat, especially as attackers may develop exploits once the vulnerability becomes widely known.

Mitigation Recommendations

To mitigate CVE-2025-70999, organizations should first monitor OneFlow vendor communications for official patches or updates addressing the device ID validation flaw and apply them promptly. In the absence of patches, implement strict input validation and sanitization at the application or middleware level to reject malformed or unexpected GPU device IDs before they reach the vulnerable function. Employ network-level protections such as firewalls and intrusion detection systems to limit access to OneFlow services, restricting exposure to trusted users and IP ranges. Conduct regular security assessments and penetration testing focused on GPU-accelerated components to identify similar weaknesses. Additionally, implement resource usage monitoring and automated alerts to detect abnormal consumption patterns indicative of exploitation attempts. For critical environments, consider isolating GPU workloads or deploying fallback mechanisms to maintain availability during an attack. Finally, maintain comprehensive logging to facilitate incident response and forensic analysis if exploitation occurs.

Need more detailed analysis?Upgrade to Pro Console

Technical Details

Data Version
5.2
Assigner Short Name
mitre
Date Reserved
2026-01-09T00:00:00.000Z
Cvss Version
null
State
PUBLISHED

Threat ID: 697a48fd4623b1157cdca04c

Added to database: 1/28/2026, 5:35:57 PM

Last enriched: 2/5/2026, 8:58:04 AM

Last updated: 2/6/2026, 7:47:52 AM

Views: 27

Community Reviews

0 reviews

Crowdsource mitigation strategies, share intel context, and vote on the most helpful responses. Sign in to add your voice and help keep defenders ahead.

Sort by
Loading community insights…

Want to contribute mitigation steps or threat intel context? Sign in or create an account to join the community discussion.

Actions

PRO

Updates to AI analysis require Pro Console access. Upgrade inside Console → Billing.

Please log in to the Console to use AI analysis features.

Need more coverage?

Upgrade to Pro Console in Console -> Billing for AI refresh and higher limits.

For incident response and remediation, OffSeq services can help resolve threats faster.

Latest Threats