Skip to main content
Press slash or control plus K to focus the search. Use the arrow keys to navigate results and press enter to open a threat.
Reconnecting to live updates…

CVE-2025-71000: n/a

0
High
VulnerabilityCVE-2025-71000cvecve-2025-71000
Published: Wed Jan 28 2026 (01/28/2026, 00:00:00 UTC)
Source: CVE Database V5

Description

CVE-2025-71000 is a vulnerability in the flow. cuda. BoolTensor component of OneFlow version 0. 9. 0 that allows an attacker to cause a Denial of Service (DoS) by providing crafted input. This vulnerability does not require authentication or known user interaction, but it can disrupt service availability by crashing or hanging the affected system. No public exploits or patches are currently available. European organizations using OneFlow for AI or machine learning workloads on CUDA-enabled GPUs are at risk of service disruption. Mitigation involves monitoring for unusual application behavior, restricting access to vulnerable components, and applying patches once released. Countries with significant AI research and development, such as Germany, France, and the UK, are more likely to be impacted.

AI-Powered Analysis

AILast updated: 01/28/2026, 18:21:18 UTC

Technical Analysis

CVE-2025-71000 is a denial of service vulnerability identified in the flow.cuda.BoolTensor component of OneFlow version 0.9.0, a deep learning framework that leverages CUDA-enabled GPUs for tensor computations. The vulnerability arises from improper handling of crafted inputs to the BoolTensor component, which can cause the application or system to crash or become unresponsive, effectively denying service to legitimate users. The flaw does not require authentication or user interaction, meaning attackers can exploit it remotely if they can supply malicious input to the vulnerable component. Although no public exploits or patches are currently available, the vulnerability is publicly disclosed and assigned a CVE identifier. OneFlow is used primarily in AI and machine learning workloads, often in research, development, and production environments that rely on GPU acceleration. The lack of a CVSS score complicates severity assessment, but the potential for service disruption in critical AI infrastructure is significant. The vulnerability's impact is limited to denial of service, with no indication of data confidentiality or integrity compromise. However, disruption of AI workloads can have cascading effects on dependent systems and services. The absence of patches necessitates proactive mitigation and monitoring by affected organizations.

Potential Impact

For European organizations, the primary impact of CVE-2025-71000 is the disruption of AI and machine learning services that utilize OneFlow with CUDA-enabled GPUs. This can lead to downtime in research environments, delays in AI model training and inference, and potential interruption of AI-driven business processes. Organizations in sectors such as automotive, finance, healthcare, and telecommunications, which increasingly rely on AI, may experience operational setbacks. The denial of service could also affect cloud service providers hosting AI workloads, impacting multiple customers. Given the growing strategic importance of AI in Europe’s digital economy and innovation landscape, such disruptions could hinder competitiveness and innovation. Additionally, organizations without robust incident response capabilities may face prolonged outages. The lack of known exploits reduces immediate risk, but the public disclosure increases the likelihood of future exploitation attempts. Overall, the impact is significant in availability terms but does not extend to data breach or system compromise.

Mitigation Recommendations

To mitigate CVE-2025-71000, European organizations should first inventory their use of OneFlow, specifically version 0.9.0, and identify systems utilizing the flow.cuda.BoolTensor component. Restrict access to these systems and inputs to trusted users and networks to reduce exposure. Implement input validation and sanitization where possible to detect and block malformed inputs targeting the BoolTensor component. Monitor application and system logs for crashes, hangs, or unusual behavior indicative of exploitation attempts. Employ runtime protections such as containerization or sandboxing to limit the impact of potential crashes. Engage with OneFlow maintainers and subscribe to security advisories to obtain patches or updates promptly once available. Consider fallback or redundancy strategies for critical AI workloads to maintain availability during incidents. Finally, conduct staff training to recognize and respond to denial of service incidents affecting AI infrastructure.

Need more detailed analysis?Upgrade to Pro Console

Technical Details

Data Version
5.2
Assigner Short Name
mitre
Date Reserved
2026-01-09T00:00:00.000Z
Cvss Version
null
State
PUBLISHED

Threat ID: 697a50074623b1157cdfcf66

Added to database: 1/28/2026, 6:05:59 PM

Last enriched: 1/28/2026, 6:21:18 PM

Last updated: 1/28/2026, 7:06:11 PM

Views: 2

Community Reviews

0 reviews

Crowdsource mitigation strategies, share intel context, and vote on the most helpful responses. Sign in to add your voice and help keep defenders ahead.

Sort by
Loading community insights…

Want to contribute mitigation steps or threat intel context? Sign in or create an account to join the community discussion.

Actions

PRO

Updates to AI analysis require Pro Console access. Upgrade inside Console → Billing.

Please log in to the Console to use AI analysis features.

Need more coverage?

Upgrade to Pro Console in Console -> Billing for AI refresh and higher limits.

For incident response and remediation, OffSeq services can help resolve threats faster.

Latest Threats