Skip to content
  • Blog Home
  • Cyber Map
  • About Us – Contact
  • Disclaimer
  • Terms and Rules
  • Privacy Policy
Cyber Web Spider Blog – News

Cyber Web Spider Blog – News

Globe Threat Map provides a real-time, interactive 3D visualization of global cyber threats. Monitor DDoS attacks, malware, and hacking attempts with geo-located arcs on a rotating globe. Stay informed with live logs and archive stats.

  • Home
  • Cyber Map
  • Cyber Security News
  • Security Week News
  • The Hacker News
  • How To?
  • Toggle search form

Rowhammer Attack Demonstrated Against DDR5

Posted on September 16, 2025September 16, 2025 By CWS

A bunch of safety researchers from the ETH Zurich college and Google have demonstrated a sensible Rowhammer assault in opposition to DDR5.

Dubbed Phoenix and tracked as CVE-2025-6202, the DDR5 Rowhammer assault was discovered to be efficient in opposition to 15 gadgets from SK Hynix, the most important DRAM producer.

As a part of a Rowhammer assault, a DRAM reminiscence row is accessed repeatedly to trigger electrical interference resulting in bit flips in adjoining areas. This might result in elevation of privileges, information corruption, information leakage, and in breaking reminiscence isolation in digital environments.

After greater than a decade of identified Rowhammer assaults focusing on CPUs and CPU-based reminiscence, a gaggle of College of Toronto researchers this 12 months demonstrated that such assaults are doable and sensible in opposition to GPUs as properly.

The newly devised Phoenix assault exhibits that, regardless of its extra subtle in-DRAM Goal Row Refresh (TRR) mechanisms meant to forestall Rowhammer assaults, DDR5 too is weak.

To show that, 4 ETH Zurich teachers and two Google researchers reverse-engineered the TRR schemes in DDR5, discovering {that a} profitable assault must “exactly observe hundreds of refresh operations”.

Of their paper (PDF), the researchers clarify that the protections DDR5 comes with require considerably longer Rowhammer patterns to be bypassed, and that these patterns want to stay in-sync with hundreds of refresh instructions.

Phoenix, nonetheless, was designed to resynchronize the sample when missed refresh operations are detected, thus triggering bit flips that allowed the researchers to create a privilege escalation exploit and acquire root on a commodity DDR5 system with default settings.Commercial. Scroll to proceed studying.

“We consider Phoenix on 15 DDR5 DIMMs from SK Hynix and present that it will possibly set off bit flips on all of them. We additionally exhibit that the bit flips are exploitable by constructing the primary Rowhammer privilege escalation exploit operating in default settings on a PC in as little as 109 seconds,” the researchers observe.

The researchers say they restricted their work to SK Hynix gadgets because of the intensive effort of reverse engineering the carried out mitigations, and level out that DDR5 gadgets from different producers shouldn’t be thought of protected in opposition to Rowhammer assaults.

Tripling the refresh charge, the researchers say, prevents Phoenix from triggering bit flips, however incurs an overhead of 8.4%. Extra principled mitigations, similar to per-row activation counters, ought to cease Rowhammer assaults utterly, they are saying.

Phoenix was disclosed to SK Hynix, CPU distributors, and main cloud suppliers in early June. Final week, AMD launched BIOS updates to deal with CVE-2025-6202 in shopper machines, the researchers observe.

Associated: VMScape: Lecturers Break Cloud Isolation With New Spectre Assault

Associated: AI Techniques Weak to Immediate Injection by way of Picture Scaling Assault

Associated: Hybrid Networks Require an Built-in On-prem and Cloud Safety Technique

Associated: Webcast Video: Rethinking Endpoint Hardening for Right this moment’s Assault Panorama

Security Week News Tags:Attack, DDR5, Demonstrated, Rowhammer

Post navigation

Previous Post: Apple Backports Fix for CVE-2025-43300 Exploited in Sophisticated Spyware Attack
Next Post: Neon Cyber Emerges from Stealth, Shining a Light into the Browser

Related Posts

Former Accenture Employee Charged Over Cybersecurity Fraud Security Week News
UK Sanctions Russian and Chinese Firms Suspected of Being ‘Malign Actors’ in Information Warfare Security Week News
Neon Cyber Emerges from Stealth, Shining a Light into the Browser Security Week News
Microsoft Patches Office Zero-Day Likely Exploited in Targeted Attacks Security Week News
UK Train Operator LNER Warns Customers of Data Breach Security Week News
Krispy Kreme Confirms Data Breach After Ransomware Attack Security Week News

Categories

  • Cyber Security News
  • How To?
  • Security Week News
  • The Hacker News

Recent Posts

  • Moltbook AI Vulnerability Exposes Email Addresses, Login Tokens, and API Keys
  • eScan Antivirus Delivers Malware in Supply Chain Attack
  • Iran-Linked RedKitten Cyber Campaign Targets Human Rights NGOs and Activists
  • Automated Penetration Testing Toolkit Designed for Linux systems
  • SCADA Vulnerability Triggers DoS, Potentially Disrupting Industrial Operations

Pages

  • About Us – Contact
  • Disclaimer
  • Privacy Policy
  • Terms and Rules

Archives

  • February 2026
  • January 2026
  • December 2025
  • November 2025
  • October 2025
  • September 2025
  • August 2025
  • July 2025
  • June 2025
  • May 2025

Recent Posts

  • Moltbook AI Vulnerability Exposes Email Addresses, Login Tokens, and API Keys
  • eScan Antivirus Delivers Malware in Supply Chain Attack
  • Iran-Linked RedKitten Cyber Campaign Targets Human Rights NGOs and Activists
  • Automated Penetration Testing Toolkit Designed for Linux systems
  • SCADA Vulnerability Triggers DoS, Potentially Disrupting Industrial Operations

Pages

  • About Us – Contact
  • Disclaimer
  • Privacy Policy
  • Terms and Rules

Categories

  • Cyber Security News
  • How To?
  • Security Week News
  • The Hacker News

Copyright © 2026 Cyber Web Spider Blog – News.

Powered by PressBook Masonry Dark