Skip to main content
Press slash or control plus K to focus the search. Use the arrow keys to navigate results and press enter to open a threat.
Reconnecting to live updates…

CVE-2025-70999: n/a

0
High
VulnerabilityCVE-2025-70999cvecve-2025-70999
Published: Wed Jan 28 2026 (01/28/2026, 00:00:00 UTC)
Source: CVE Database V5

Description

CVE-2025-70999 is a vulnerability in the OneFlow v0. 9. 0 deep learning framework, specifically in the flow. cuda. get_device_capability() function. The flaw arises from improper validation of GPU device IDs, allowing an attacker to supply a crafted device ID that triggers a Denial of Service (DoS) condition. This vulnerability does not require authentication or user interaction but can disrupt availability by crashing or halting the affected application. There are no known exploits in the wild, and no patches have been published yet. The impact is primarily on availability, with no direct confidentiality or integrity compromise reported. European organizations using OneFlow for GPU-accelerated machine learning workloads could face operational disruptions.

AI-Powered Analysis

AILast updated: 01/28/2026, 17:50:14 UTC

Technical Analysis

CVE-2025-70999 identifies a vulnerability in the OneFlow deep learning framework version 0.9.0, specifically within the flow.cuda.get_device_capability() function responsible for querying GPU device capabilities. The vulnerability stems from insufficient validation of the GPU device ID parameter, which an attacker can manipulate by providing a crafted device ID. This malformed input causes the function to behave unexpectedly, leading to a Denial of Service (DoS) condition, such as application crashes or hangs. Since OneFlow is used for GPU-accelerated machine learning tasks, this flaw can disrupt critical AI workloads. The vulnerability does not require authentication or user interaction, making it easier for attackers to exploit if they have access to the environment where OneFlow is running. No CVSS score has been assigned yet, and no patches or known exploits are currently available. The flaw affects availability but does not appear to compromise confidentiality or integrity. The lack of patches necessitates proactive monitoring and mitigation strategies. Given the increasing adoption of OneFlow in AI research and production environments, this vulnerability poses a tangible risk to organizations relying on GPU-based computation.

Potential Impact

For European organizations, the primary impact of CVE-2025-70999 is operational disruption due to Denial of Service conditions in AI and machine learning workloads that utilize OneFlow with GPU acceleration. This can lead to downtime in research environments, delays in AI model training or inference, and potential cascading effects on dependent services or products. Industries such as automotive, finance, healthcare, and telecommunications, which increasingly rely on AI, may experience productivity losses or service interruptions. Cloud service providers hosting AI workloads with OneFlow could see degraded service quality or availability issues affecting multiple clients. While confidentiality and integrity impacts are not evident, the availability impact can affect business continuity and service-level agreements. The absence of known exploits reduces immediate risk but does not eliminate the threat, especially as attackers may develop exploits once the vulnerability becomes widely known.

Mitigation Recommendations

1. Implement strict input validation on GPU device ID parameters within any custom wrappers or integrations around OneFlow to prevent malformed inputs. 2. Monitor application logs and GPU-related error messages for signs of crashes or abnormal behavior linked to device capability queries. 3. Isolate OneFlow workloads in controlled environments with limited access to reduce the attack surface. 4. Restrict user permissions to prevent unauthorized users from invoking GPU device queries with arbitrary parameters. 5. Engage with OneFlow maintainers or community to track patch releases and apply updates promptly once available. 6. Consider fallback mechanisms or redundancy in AI workloads to maintain availability during potential DoS events. 7. Conduct security assessments and penetration testing focusing on GPU device interaction components. 8. Educate developers and operators about this vulnerability to increase awareness and readiness.

Need more detailed analysis?Upgrade to Pro Console

Technical Details

Data Version
5.2
Assigner Short Name
mitre
Date Reserved
2026-01-09T00:00:00.000Z
Cvss Version
null
State
PUBLISHED

Threat ID: 697a48fd4623b1157cdca04c

Added to database: 1/28/2026, 5:35:57 PM

Last enriched: 1/28/2026, 5:50:14 PM

Last updated: 1/28/2026, 6:51:26 PM

Views: 2

Community Reviews

0 reviews

Crowdsource mitigation strategies, share intel context, and vote on the most helpful responses. Sign in to add your voice and help keep defenders ahead.

Sort by
Loading community insights…

Want to contribute mitigation steps or threat intel context? Sign in or create an account to join the community discussion.

Actions

PRO

Updates to AI analysis require Pro Console access. Upgrade inside Console → Billing.

Please log in to the Console to use AI analysis features.

Need more coverage?

Upgrade to Pro Console in Console -> Billing for AI refresh and higher limits.

For incident response and remediation, OffSeq services can help resolve threats faster.

Latest Threats