Skip to main content
Press slash or control plus K to focus the search. Use the arrow keys to navigate results and press enter to open a threat.
Reconnecting to live updates…

CVE-2025-71009: n/a

0
Medium
VulnerabilityCVE-2025-71009cvecve-2025-71009
Published: Thu Jan 29 2026 (01/29/2026, 00:00:00 UTC)
Source: CVE Database V5

Description

An input validation vulnerability in the flow.scatter/flow.scatter_add component of OneFlow v0.9.0 allows attackers to cause a Denial of Service (DoS) via a crafted indices.

AI-Powered Analysis

AILast updated: 01/29/2026, 15:27:37 UTC

Technical Analysis

CVE-2025-71009 is a vulnerability identified in the flow.scatter and flow.scatter_add components of OneFlow version 0.9.0, a popular open-source deep learning framework. The root cause is insufficient input validation on indices passed to these functions, which are typically used for tensor operations involving scattering data elements into a target tensor. An attacker can craft malicious indices that trigger unexpected behavior, leading to a Denial of Service (DoS) condition. This DoS could manifest as application crashes, infinite loops, or resource exhaustion, thereby disrupting AI model training or inference workflows relying on OneFlow. The vulnerability does not require authentication or user interaction, making it easier to exploit in exposed environments. Currently, there are no known exploits in the wild and no patches have been released, but the vulnerability has been publicly disclosed and assigned a CVE identifier. The lack of a CVSS score indicates that the vulnerability is newly published and pending further analysis. OneFlow is used in AI research, development, and production, so this vulnerability could affect a wide range of organizations leveraging AI workloads.

Potential Impact

For European organizations, the primary impact is the potential disruption of AI and machine learning operations that depend on OneFlow. This could affect research institutions, technology companies, and enterprises integrating AI into their products or services. A successful DoS attack could halt model training or inference, leading to downtime, delayed projects, and potential financial losses. In critical sectors such as healthcare, automotive, or finance where AI models may support decision-making, this disruption could have cascading effects on service delivery and operational efficiency. Additionally, organizations may face reputational damage if service interruptions affect customers or partners. Since OneFlow is a specialized framework, the impact is concentrated on entities with AI workloads rather than general IT infrastructure.

Mitigation Recommendations

Organizations should immediately audit their use of OneFlow, particularly version 0.9.0, and identify any deployments using the flow.scatter or flow.scatter_add components. Until a patch is available, implement strict input validation and sanitization on any user-supplied or external data feeding into these functions to prevent malformed indices. Employ runtime monitoring and anomaly detection to identify unusual input patterns or application crashes indicative of exploitation attempts. Isolate AI workloads in segmented environments to limit the blast radius of potential DoS attacks. Engage with the OneFlow community or vendor to track patch releases and apply updates promptly once available. Additionally, consider fallback mechanisms or redundancy in AI workflows to maintain availability during remediation.

Need more detailed analysis?Upgrade to Pro Console

Technical Details

Data Version
5.2
Assigner Short Name
mitre
Date Reserved
2026-01-09T00:00:00.000Z
Cvss Version
null
State
PUBLISHED

Threat ID: 697b7905ac06320222957a22

Added to database: 1/29/2026, 3:13:09 PM

Last enriched: 1/29/2026, 3:27:37 PM

Last updated: 2/5/2026, 10:14:50 PM

Views: 22

Community Reviews

0 reviews

Crowdsource mitigation strategies, share intel context, and vote on the most helpful responses. Sign in to add your voice and help keep defenders ahead.

Sort by
Loading community insights…

Want to contribute mitigation steps or threat intel context? Sign in or create an account to join the community discussion.

Actions

PRO

Updates to AI analysis require Pro Console access. Upgrade inside Console → Billing.

Please log in to the Console to use AI analysis features.

Need more coverage?

Upgrade to Pro Console in Console -> Billing for AI refresh and higher limits.

For incident response and remediation, OffSeq services can help resolve threats faster.

Latest Threats