Skip to main content
Press slash or control plus K to focus the search. Use the arrow keys to navigate results and press enter to open a threat.
Reconnecting to live updates…

CVE-2025-71000: n/a

0
High
VulnerabilityCVE-2025-71000cvecve-2025-71000
Published: Wed Jan 28 2026 (01/28/2026, 00:00:00 UTC)
Source: CVE Database V5

Description

CVE-2025-71000 is a high-severity vulnerability in the flow. cuda. BoolTensor component of OneFlow v0. 9. 0 that allows unauthenticated attackers to cause a Denial of Service (DoS) by sending crafted inputs. The vulnerability does not impact confidentiality or integrity but can disrupt availability by crashing or hanging the affected system. Exploitation requires no privileges or user interaction and can be performed remotely over the network. No known exploits are currently in the wild, and no patches have been published yet. European organizations using OneFlow, especially in AI and machine learning workloads leveraging GPU acceleration, are at risk of service disruption. Countries with significant AI research and deployment, such as Germany, France, and the UK, are more likely to be affected.

AI-Powered Analysis

AILast updated: 02/05/2026, 08:58:20 UTC

Technical Analysis

CVE-2025-71000 is a vulnerability identified in the flow.cuda.BoolTensor component of OneFlow version 0.9.0, an open-source deep learning framework that supports GPU acceleration. The flaw allows attackers to trigger a Denial of Service (DoS) condition by submitting specially crafted inputs to the vulnerable component. Specifically, the issue relates to improper handling of input data within the BoolTensor operations on CUDA-enabled devices, leading to resource exhaustion or application crashes. The vulnerability is classified under CWE-400 (Uncontrolled Resource Consumption), indicating that the attack exploits the system's inability to properly manage resource allocation under malicious input conditions. The CVSS v3.1 base score is 7.5, reflecting high severity due to the vulnerability's network attack vector (AV:N), low attack complexity (AC:L), no privileges required (PR:N), no user interaction (UI:N), and impact limited to availability (A:H) without affecting confidentiality or integrity. No patches or fixes have been released at the time of publication, and there are no known active exploits. The vulnerability affects OneFlow v0.9.0, but the exact range of affected versions is unspecified. Given OneFlow's role in AI model training and inference, particularly in GPU-accelerated environments, exploitation could disrupt critical AI workloads by causing application crashes or system unavailability.

Potential Impact

For European organizations, especially those engaged in AI research, development, and deployment using OneFlow, this vulnerability poses a significant risk to service availability. Disruption caused by DoS attacks can lead to downtime in AI model training pipelines, inference services, and other GPU-accelerated computations, potentially delaying projects and causing financial losses. Industries such as automotive, healthcare, finance, and manufacturing, which increasingly rely on AI and machine learning, may experience operational interruptions. Additionally, cloud service providers hosting OneFlow-based workloads could face customer impact and reputational damage. The lack of required authentication and user interaction makes the vulnerability easier to exploit remotely, increasing the threat surface. Although no confidentiality or integrity impact is reported, availability degradation can indirectly affect business continuity and compliance with service-level agreements (SLAs).

Mitigation Recommendations

European organizations should immediately audit their use of OneFlow, particularly version 0.9.0, and identify any exposed services or systems utilizing the flow.cuda.BoolTensor component. Network-level controls such as firewall rules and segmentation should be implemented to restrict access to OneFlow services to trusted internal networks or VPNs. Monitoring and alerting should be enhanced to detect abnormal application crashes, resource exhaustion, or unusual input patterns targeting OneFlow components. Organizations should engage with the OneFlow community or vendors to obtain patches or updates as soon as they become available and prioritize their deployment. In the interim, consider disabling or isolating vulnerable components if feasible, or migrating workloads to alternative frameworks not affected by this vulnerability. Implementing rate limiting and input validation at the application layer can also reduce the risk of exploitation. Finally, maintaining comprehensive backups and incident response plans will help mitigate the impact of potential DoS incidents.

Need more detailed analysis?Upgrade to Pro Console

Technical Details

Data Version
5.2
Assigner Short Name
mitre
Date Reserved
2026-01-09T00:00:00.000Z
Cvss Version
null
State
PUBLISHED

Threat ID: 697a50074623b1157cdfcf66

Added to database: 1/28/2026, 6:05:59 PM

Last enriched: 2/5/2026, 8:58:20 AM

Last updated: 2/5/2026, 9:09:06 PM

Views: 26

Community Reviews

0 reviews

Crowdsource mitigation strategies, share intel context, and vote on the most helpful responses. Sign in to add your voice and help keep defenders ahead.

Sort by
Loading community insights…

Want to contribute mitigation steps or threat intel context? Sign in or create an account to join the community discussion.

Actions

PRO

Updates to AI analysis require Pro Console access. Upgrade inside Console → Billing.

Please log in to the Console to use AI analysis features.

Need more coverage?

Upgrade to Pro Console in Console -> Billing for AI refresh and higher limits.

For incident response and remediation, OffSeq services can help resolve threats faster.

Latest Threats