New Phoenix RowHammer Attack Cracks Open DDR5 Memory Defenses in Minutes
Phoenix attack bypasses DDR5 defenses by exploiting unsampled refresh intervals, affecting 73% of tested DIMMs and enabling rapid root privilege escalation, researchers say.
9 Articles
9 Articles
SK Hynix DDR5 DIMMs Vulnerable to "Phoenix" Rowhammer Attack, ECC DIMMs Exposed Too
Researchers from ETH Zurich and Google have shown that SK Hynix DDR5 modules remain vulnerable to a new Rowhammer variant they call Phoenix (CVE-2025-6202), even with on-die ECC memory modules. The attack can be executed in only 109 seconds, making it a very realistic threat. By reverse engineering the built-in DRAM mitigation (TRR) for the already existing Rowhammer exploit, the team found a blind spot in the refresh-sampling logic: the mitigat…
New Phoenix Rowhammer Attack Variant Bypasses Protection With DDR5 Chips
A new Rowhammer attack variant named Phoenix can bypass the latest protections in modern DDR5 memory chips, researchers have revealed. The attack is the first to demonstrate a practical privilege escalation exploit on a commodity system equipped with DDR5 RAM,… Read more → The post New Phoenix Rowhammer Attack Variant Bypasses Protection With DDR5 Chips appeared first on IT Security News.


Phoenix RowHammer Attack Bypasses Advanced DDR5 Memory Protections in 109 Seconds
A team of academics from ETH Zürich and Google has discovered a new variant of a RowHammer attack targeting Double Data Rate 5 (DDR5) memory chips from South Korean semiconductor vendor SK Hynix. The RowHammer attack variant, codenamed Phoenix (CVE-2025-6202, CVSS score: 7.1), is capable of bypassing sophisticated protection mechanisms put in place to resist the attack. "We have proven that
Coverage Details
Bias Distribution
- 100% of the sources are Center
Factuality
To view factuality data please Upgrade to Premium