Skip to main content
Press slash or control plus K to focus the search. Use the arrow keys to navigate results and press enter to open a threat.
Reconnecting to live updates…

CVE-2025-71005: n/a

0
Medium
VulnerabilityCVE-2025-71005cvecve-2025-71005
Published: Wed Jan 28 2026 (01/28/2026, 00:00:00 UTC)
Source: CVE Database V5

Description

CVE-2025-71005 is a vulnerability in the oneflow. view component of OneFlow version 0. 9. 0 that allows an attacker to trigger a floating point exception (FPE) by supplying crafted input. This flaw can be exploited to cause a Denial of Service (DoS) condition, disrupting service availability. No known exploits are currently in the wild, and no CVSS score has been assigned yet. The vulnerability does not require authentication but does require the attacker to provide malicious input to the affected component. The impact is primarily on availability, with no indication of confidentiality or integrity compromise. European organizations using OneFlow 0. 9.

AI-Powered Analysis

AILast updated: 01/28/2026, 20:50:15 UTC

Technical Analysis

CVE-2025-71005 identifies a floating point exception vulnerability in the oneflow.view component of OneFlow version 0.9.0. OneFlow is a deep learning framework used for AI model training and inference. The vulnerability arises when the component processes crafted inputs that cause a floating point exception, leading to a Denial of Service (DoS) condition. This exception typically results from invalid arithmetic operations such as division by zero or overflow during floating point calculations. The flaw allows attackers to disrupt the availability of services relying on OneFlow by crashing the process or causing it to become unresponsive. There is no evidence that this vulnerability can be leveraged for code execution, privilege escalation, or data leakage. No CVSS score has been assigned yet, and no patches or exploits are currently known. The vulnerability does not require authentication but does require the attacker to send maliciously crafted inputs to the vulnerable component. This makes it a remotely exploitable DoS vector in environments where OneFlow 0.9.0 is exposed to untrusted input. The lack of patches means organizations must rely on mitigating controls until updates are released. The vulnerability was reserved and published in January 2026, indicating recent discovery and disclosure.

Potential Impact

The primary impact of CVE-2025-71005 is on the availability of systems running OneFlow 0.9.0, as the floating point exception can cause application crashes or hangs. For European organizations leveraging OneFlow in AI research, development, or production environments, this could interrupt critical machine learning workflows, delaying projects and potentially causing financial or operational losses. Since OneFlow is used in high-performance computing and AI model training, disruption could affect sectors such as automotive, manufacturing, healthcare, and finance where AI is increasingly integrated. Although the vulnerability does not compromise confidentiality or integrity, the DoS impact could degrade service levels and trust in AI infrastructure. Organizations with exposed or externally accessible OneFlow services are at higher risk. The absence of known exploits reduces immediate risk, but the ease of triggering floating point exceptions means attackers could weaponize this vulnerability quickly once details are widely known. The impact is thus moderate but could escalate if combined with other attack vectors or in environments lacking robust monitoring and recovery mechanisms.

Mitigation Recommendations

1. Monitor OneFlow instances for crashes or abnormal behavior indicative of floating point exceptions. 2. Implement strict input validation and sanitization to prevent malformed or malicious inputs from reaching the oneflow.view component. 3. Restrict network access to OneFlow services to trusted internal users and systems only, minimizing exposure to untrusted inputs. 4. Employ containerization or sandboxing to isolate OneFlow processes, limiting the blast radius of potential DoS conditions. 5. Maintain regular backups and ensure rapid recovery procedures are in place to restore AI workloads if disruptions occur. 6. Stay alert for official patches or updates from OneFlow maintainers and apply them promptly once available. 7. Conduct security testing and fuzzing on OneFlow components to identify and mitigate similar vulnerabilities proactively. 8. Use runtime protection tools that can detect and prevent floating point exceptions or abnormal process terminations. These targeted measures go beyond generic advice by focusing on input control, isolation, and operational resilience specific to OneFlow deployments.

Need more detailed analysis?Upgrade to Pro Console

Technical Details

Data Version
5.2
Assigner Short Name
mitre
Date Reserved
2026-01-09T00:00:00.000Z
Cvss Version
null
State
PUBLISHED

Threat ID: 697a73324623b1157ceda5e4

Added to database: 1/28/2026, 8:36:02 PM

Last enriched: 1/28/2026, 8:50:15 PM

Last updated: 1/28/2026, 9:51:02 PM

Views: 2

Community Reviews

0 reviews

Crowdsource mitigation strategies, share intel context, and vote on the most helpful responses. Sign in to add your voice and help keep defenders ahead.

Sort by
Loading community insights…

Want to contribute mitigation steps or threat intel context? Sign in or create an account to join the community discussion.

Actions

PRO

Updates to AI analysis require Pro Console access. Upgrade inside Console → Billing.

Please log in to the Console to use AI analysis features.

Need more coverage?

Upgrade to Pro Console in Console -> Billing for AI refresh and higher limits.

For incident response and remediation, OffSeq services can help resolve threats faster.

Latest Threats