Close Menu
  • Home
  • Identity
  • Inventions
  • Future
  • Science
  • Startups
  • Spanish
What's Hot

CISA reports flaw in Adobe AEM with perfect 10.0 score – already under active attack

Discover Spotify working on ‘SongDNA’ feature to introduce you to the people behind your favorite music

Apple adds 650 megawatts of renewable energy in Europe, also deploys renewable energy in China

Facebook X (Twitter) Instagram
  • Home
  • About Us
  • Advertise with Us
  • Contact Us
  • DMCA
  • Privacy Policy
  • Terms & Conditions
  • User-Submitted Posts
Facebook X (Twitter) Instagram
Fyself News
  • Home
  • Identity
  • Inventions
  • Future
  • Science
  • Startups
  • Spanish
Fyself News
Home » Phoenix Rowhammer Attack bypasses advanced DDR5 memory protection in 109 seconds
Identity

Phoenix Rowhammer Attack bypasses advanced DDR5 memory protection in 109 seconds

userBy userSeptember 16, 2025No Comments3 Mins Read
Share Facebook Twitter Pinterest Telegram LinkedIn Tumblr Email Copy Link
Follow Us
Google News Flipboard
Share
Facebook Twitter LinkedIn Pinterest Email Copy Link

September 16, 2025Ravi LakshmananHardware security/vulnerabilities

Low Hammer Attack

A team of scholars from EthZürich and Google have discovered a new variant of the Rowhammer attack targeting the double data rate 5 (DDR5) memory chips of Korean semiconductor vendor SK Hynix.

The Rowhammer Attack Variant, known as the codename Phoenix (CVE-2025-6202, CVSS score: 7.1), can bypass advanced protective mechanisms set up to resist attacks.

“We have proven that it is possible on a large scale to reliably trigger a Rowhammer bit flip on SK Hynix’s DDR5 devices,” EthZürich said. “We also proved that Die ECC won’t stop Rowhammer and that Rowhammer’s end-to-end attack is still possible in DDR5.”

Audit and subsequent

Rowhammer refers to a hardware vulnerability because repeated accesses of a column of memory in a drum chip can trigger bit flips on adjacent rows. This can then be weaponized by bad actors, gaining unauthorized access to data, escalating privileges, or even denying services.

Although first demonstrated in 2014, future DRAM chips are susceptible to Rowhammer attacks as DRAM manufacturers rely on density scaling to increase DRAM capacity.

A study published by researchers EthZürich in 2020 found that “new DRAM chips are more vulnerable to Rowhammer. As device feature size decreases, the number of activations required to induce Rowhammer bit flips also decreases.”

Further studies of subjects have demonstrated that vulnerability has several dimensions and is sensitive to several variables, including environmental conditions (temperature and voltage), process variation, stored data patterns, memory access patterns, and memory control policies.

Major mitigations for Rowhammer attacks include error correction codes (ECC) and target row updates (TRR). However, these measures have proven ineffective against more sophisticated attacks such as Trespass, Smash, Half-Double, and Blacksmith.

The latest findings from EthZürich and Google show that bypass advanced TRR defenses on DDR5 memory and that researchers can open the door for what is called “the first Rowhammer privilege escalation exploit in a standard production-grade desktop system with DDR5 memory.”

In other words, the final result is a privileged escalation exploit that gets the route of a DDR5 system with default settings in just 109 seconds. Specifically, this attack takes advantage of the fact that it does not sample a specific update interval to flip bits across all 15 DDR5 memory chips in the test pool generated between 2021 and 2024.

Potential exploitation scenarios involving these bit-flips allow you to target RSA-2048 keys in co-located virtual machines to break SSH authentication, and use SUDO binaries to escalate local privileges to the root user.

CIS Build Kit

“The inability to update wild DRAM devices will remain vulnerable for years,” the researchers said. “We recommend tripling the refresh rate, which has stopped Phoenix from triggering bit flips in the test system.”

The disclosure comes weeks after researchers from George Mason University and Georgia Tech detailed two different Rowhammer attacks, called OneFlip and ECC.Fail, respectively.

OneFlip revolves around triggering one bitflip to change weights in a deep neural network (DNN) model and activating unintended behavior, while ECC.Fail is described as the first end-to-end Rowhammer attack valid for DDR4 server machines with ECC memory.

“Unlike the counterparts on a PC, the server has additional protection against corrupted memory data (e.g., Rowhammer or Cosmic Ray Bit Flips) in the form of errors that fix the code,” the researchers said. “They can detect bit flips in memory and even potentially correct them. ECC.FAIL bypasses these protections by carefully guiding Rowhammer bit flips at specific memory locations.”


Source link

#BlockchainIdentity #Cybersecurity #DataProtection #DigitalEthics #DigitalIdentity #Privacy
Follow on Google News Follow on Flipboard
Share. Facebook Twitter Pinterest LinkedIn Tumblr Email Copy Link
Previous ArticleNuclear-driven ammonia production led by US UNI
Next Article Nofence has secured £26 million in funding to expand its virtual fencing technology
user
  • Website

Related Posts

CISA reports flaw in Adobe AEM with perfect 10.0 score – already under active attack

October 16, 2025

Chinese threat group Jewelbug secretly infiltrated Russian IT networks for months

October 15, 2025

F5 breach exposes BIG-IP source code — state hackers behind massive intrusion

October 15, 2025
Add A Comment
Leave A Reply Cancel Reply

Latest Posts

CISA reports flaw in Adobe AEM with perfect 10.0 score – already under active attack

Discover Spotify working on ‘SongDNA’ feature to introduce you to the people behind your favorite music

Apple adds 650 megawatts of renewable energy in Europe, also deploys renewable energy in China

Chinese threat group Jewelbug secretly infiltrated Russian IT networks for months

Trending Posts

Subscribe to News

Subscribe to our newsletter and never miss our latest news

Please enable JavaScript in your browser to complete this form.
Loading

Welcome to Fyself News, your go-to platform for the latest in tech, startups, inventions, sustainability, and fintech! We are a passionate team of enthusiasts committed to bringing you timely, insightful, and accurate information on the most pressing developments across these industries. Whether you’re an entrepreneur, investor, or just someone curious about the future of technology and innovation, Fyself News has something for you.

The AI Revolution: Beyond Superintelligence – TwinH Leads the Charge in Personalized, Secure Digital Identities

Revolutionize Your Workflow: TwinH Automates Tasks Without Your Presence

FySelf’s TwinH Unlocks 6 Vertical Ecosystems: Your Smart Digital Double for Every Aspect of Life

Beyond the Algorithm: How FySelf’s TwinH and Reinforcement Learning are Reshaping Future Education

Facebook X (Twitter) Instagram Pinterest YouTube
  • Home
  • About Us
  • Advertise with Us
  • Contact Us
  • DMCA
  • Privacy Policy
  • Terms & Conditions
  • User-Submitted Posts
© 2025 news.fyself. Designed by by fyself.

Type above and press Enter to search. Press Esc to cancel.