CVE-2025-71002: n/a
CVE-2025-71002 is a medium-severity vulnerability in OneFlow v0. 9. 0's flow. column_stack component, where a crafted input triggers a floating-point exception causing a denial of service (DoS). The vulnerability requires no privileges but does require user interaction and can be exploited remotely over the network. It impacts availability without affecting confidentiality or integrity. No known exploits are currently in the wild, and no patches have been published yet. European organizations using OneFlow for machine learning or data processing may experience service disruptions if targeted. Mitigation involves input validation, restricting access to vulnerable components, and monitoring for anomalous inputs. Countries with strong AI and data science sectors, such as Germany, France, and the UK, are more likely to be affected.
AI Analysis
Technical Summary
CVE-2025-71002 is a vulnerability identified in the flow.column_stack component of OneFlow version 0.9.0, a machine learning framework. The flaw is a floating-point exception (FPE) triggered by specially crafted inputs. This exception leads to a denial of service (DoS) condition, causing the affected process or service to crash or become unresponsive. The vulnerability is remotely exploitable over the network without requiring any privileges, but it does require user interaction, such as processing maliciously crafted data inputs. The CVSS v3.1 base score is 6.5, indicating medium severity, with the vector AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H, meaning no impact on confidentiality or integrity but a high impact on availability. The underlying weaknesses correspond to CWE-369 (Divide by Zero), CWE-704 (Incorrect Type Conversion or Cast), and CWE-681 (Incorrect Conversion between Numeric Types). No patches or fixes have been released at the time of publication, and no known exploits have been observed in the wild. The vulnerability could disrupt services relying on OneFlow for data stacking operations, potentially affecting AI workflows and data pipelines.
Potential Impact
For European organizations, the primary impact is service disruption due to denial of service attacks targeting OneFlow deployments. This can affect availability of AI and data processing services, potentially delaying critical business operations, research, or analytics. Organizations relying on OneFlow in production environments, especially in sectors like finance, healthcare, and manufacturing where AI workloads are common, may face operational downtime. While confidentiality and integrity are not directly impacted, the loss of availability could indirectly affect business continuity and trust. The absence of patches increases risk exposure until mitigations are applied. Additionally, if attackers leverage this vulnerability in combination with other threats, it could facilitate more complex attack chains. The impact is more pronounced in organizations with externally facing AI services or those processing untrusted inputs without adequate filtering.
Mitigation Recommendations
Given the lack of an official patch, European organizations should implement strict input validation and sanitization to prevent malformed data from reaching the flow.column_stack component. Network-level protections such as firewalls and intrusion detection systems should be configured to monitor and block suspicious traffic patterns targeting OneFlow services. Restrict access to OneFlow instances to trusted users and networks, minimizing exposure to untrusted inputs. Employ application-layer gateways or proxies to inspect and filter data before processing. Monitor logs and system behavior for signs of crashes or anomalies indicative of exploitation attempts. Consider isolating OneFlow workloads in containerized or sandboxed environments to limit impact of potential crashes. Engage with OneFlow maintainers and subscribe to security advisories for timely patch releases. Finally, develop incident response plans to quickly address DoS events affecting AI services.
Affected Countries
Germany, France, United Kingdom, Netherlands, Sweden, Finland
CVE-2025-71002: n/a
Description
CVE-2025-71002 is a medium-severity vulnerability in OneFlow v0. 9. 0's flow. column_stack component, where a crafted input triggers a floating-point exception causing a denial of service (DoS). The vulnerability requires no privileges but does require user interaction and can be exploited remotely over the network. It impacts availability without affecting confidentiality or integrity. No known exploits are currently in the wild, and no patches have been published yet. European organizations using OneFlow for machine learning or data processing may experience service disruptions if targeted. Mitigation involves input validation, restricting access to vulnerable components, and monitoring for anomalous inputs. Countries with strong AI and data science sectors, such as Germany, France, and the UK, are more likely to be affected.
AI-Powered Analysis
Technical Analysis
CVE-2025-71002 is a vulnerability identified in the flow.column_stack component of OneFlow version 0.9.0, a machine learning framework. The flaw is a floating-point exception (FPE) triggered by specially crafted inputs. This exception leads to a denial of service (DoS) condition, causing the affected process or service to crash or become unresponsive. The vulnerability is remotely exploitable over the network without requiring any privileges, but it does require user interaction, such as processing maliciously crafted data inputs. The CVSS v3.1 base score is 6.5, indicating medium severity, with the vector AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H, meaning no impact on confidentiality or integrity but a high impact on availability. The underlying weaknesses correspond to CWE-369 (Divide by Zero), CWE-704 (Incorrect Type Conversion or Cast), and CWE-681 (Incorrect Conversion between Numeric Types). No patches or fixes have been released at the time of publication, and no known exploits have been observed in the wild. The vulnerability could disrupt services relying on OneFlow for data stacking operations, potentially affecting AI workflows and data pipelines.
Potential Impact
For European organizations, the primary impact is service disruption due to denial of service attacks targeting OneFlow deployments. This can affect availability of AI and data processing services, potentially delaying critical business operations, research, or analytics. Organizations relying on OneFlow in production environments, especially in sectors like finance, healthcare, and manufacturing where AI workloads are common, may face operational downtime. While confidentiality and integrity are not directly impacted, the loss of availability could indirectly affect business continuity and trust. The absence of patches increases risk exposure until mitigations are applied. Additionally, if attackers leverage this vulnerability in combination with other threats, it could facilitate more complex attack chains. The impact is more pronounced in organizations with externally facing AI services or those processing untrusted inputs without adequate filtering.
Mitigation Recommendations
Given the lack of an official patch, European organizations should implement strict input validation and sanitization to prevent malformed data from reaching the flow.column_stack component. Network-level protections such as firewalls and intrusion detection systems should be configured to monitor and block suspicious traffic patterns targeting OneFlow services. Restrict access to OneFlow instances to trusted users and networks, minimizing exposure to untrusted inputs. Employ application-layer gateways or proxies to inspect and filter data before processing. Monitor logs and system behavior for signs of crashes or anomalies indicative of exploitation attempts. Consider isolating OneFlow workloads in containerized or sandboxed environments to limit impact of potential crashes. Engage with OneFlow maintainers and subscribe to security advisories for timely patch releases. Finally, develop incident response plans to quickly address DoS events affecting AI services.
Affected Countries
Technical Details
- Data Version
- 5.2
- Assigner Short Name
- mitre
- Date Reserved
- 2026-01-09T00:00:00.000Z
- Cvss Version
- null
- State
- PUBLISHED
Threat ID: 697a653b4623b1157cea4ef2
Added to database: 1/28/2026, 7:36:27 PM
Last enriched: 2/5/2026, 8:49:35 AM
Last updated: 2/7/2026, 2:54:24 AM
Views: 29
Community Reviews
0 reviewsCrowdsource mitigation strategies, share intel context, and vote on the most helpful responses. Sign in to add your voice and help keep defenders ahead.
Want to contribute mitigation steps or threat intel context? Sign in or create an account to join the community discussion.
Related Threats
CVE-2026-2071: Buffer Overflow in UTT 进取 520W
HighCVE-2026-25762: CWE-400: Uncontrolled Resource Consumption in adonisjs core
HighCVE-2026-25754: CWE-1321: Improperly Controlled Modification of Object Prototype Attributes ('Prototype Pollution') in adonisjs core
HighCVE-2026-25644: CWE-295: Improper Certificate Validation in datahub-project datahub
HighCVE-2026-25804: CWE-287: Improper Authentication in antrea-io antrea
HighActions
Updates to AI analysis require Pro Console access. Upgrade inside Console → Billing.
Need more coverage?
Upgrade to Pro Console in Console -> Billing for AI refresh and higher limits.
For incident response and remediation, OffSeq services can help resolve threats faster.