Ruh-roh. DDR5 memory vulnerable to new Rowhammer attack
9 Articles
9 Articles
The latest DRAM technology contains a security problem that allows access to your data using an attack technique known as Rowhammer.
New Rowhammer technique against DDR5 achieves privilege escalation
Researchers have devised a new technique to trigger Rowhammer bit flips inside the memory cells of DDR5 RAM modules, which were believed to be protected against such attacks. This type of attack allows controlled memory modification leading to privilege escalation exploits or the leaking of sensitive data stored in restricted memory regions. To achieve their new attack, dubbed Phoenix, researchers from ETH Zurich and Google reverse-engineered th…
DDR5 memory, especially from SK Hynix as a chip manufacturer, is widely used. Tests have now shown that corresponding memory chips from the production years 2021 to 2024 are particularly vulnerable to the Phoenix Rowhammer security gap.
Researchers broke through all DDR5 protective measures with a new Rowhammer attack on Phoenix. In just 109 seconds, attackers gain root access to standard desktop systems. SK Hynix modules were tested from 2021 to 2024. (Continue reading)
Coverage Details
Bias Distribution
- 100% of the sources are Center
Factuality
To view factuality data please Upgrade to Premium