Skip to content
  • Blog Home
  • Cyber Map
  • About Us – Contact
  • Disclaimer
  • Terms and Rules
  • Privacy Policy
Cyber Web Spider Blog – News

Cyber Web Spider Blog – News

Globe Threat Map provides a real-time, interactive 3D visualization of global cyber threats. Monitor DDoS attacks, malware, and hacking attempts with geo-located arcs on a rotating globe. Stay informed with live logs and archive stats.

  • Home
  • Cyber Map
  • Cyber Security News
  • Security Week News
  • The Hacker News
  • How To?
  • Toggle search form

Rowhammer Attack Demonstrated Against DDR5

Posted on September 16, 2025September 16, 2025 By CWS

A bunch of safety researchers from the ETH Zurich college and Google have demonstrated a sensible Rowhammer assault in opposition to DDR5.

Dubbed Phoenix and tracked as CVE-2025-6202, the DDR5 Rowhammer assault was discovered to be efficient in opposition to 15 gadgets from SK Hynix, the most important DRAM producer.

As a part of a Rowhammer assault, a DRAM reminiscence row is accessed repeatedly to trigger electrical interference resulting in bit flips in adjoining areas. This might result in elevation of privileges, information corruption, information leakage, and in breaking reminiscence isolation in digital environments.

After greater than a decade of identified Rowhammer assaults focusing on CPUs and CPU-based reminiscence, a gaggle of College of Toronto researchers this 12 months demonstrated that such assaults are doable and sensible in opposition to GPUs as properly.

The newly devised Phoenix assault exhibits that, regardless of its extra subtle in-DRAM Goal Row Refresh (TRR) mechanisms meant to forestall Rowhammer assaults, DDR5 too is weak.

To show that, 4 ETH Zurich teachers and two Google researchers reverse-engineered the TRR schemes in DDR5, discovering {that a} profitable assault must “exactly observe hundreds of refresh operations”.

Of their paper (PDF), the researchers clarify that the protections DDR5 comes with require considerably longer Rowhammer patterns to be bypassed, and that these patterns want to stay in-sync with hundreds of refresh instructions.

Phoenix, nonetheless, was designed to resynchronize the sample when missed refresh operations are detected, thus triggering bit flips that allowed the researchers to create a privilege escalation exploit and acquire root on a commodity DDR5 system with default settings.Commercial. Scroll to proceed studying.

“We consider Phoenix on 15 DDR5 DIMMs from SK Hynix and present that it will possibly set off bit flips on all of them. We additionally exhibit that the bit flips are exploitable by constructing the primary Rowhammer privilege escalation exploit operating in default settings on a PC in as little as 109 seconds,” the researchers observe.

The researchers say they restricted their work to SK Hynix gadgets because of the intensive effort of reverse engineering the carried out mitigations, and level out that DDR5 gadgets from different producers shouldn’t be thought of protected in opposition to Rowhammer assaults.

Tripling the refresh charge, the researchers say, prevents Phoenix from triggering bit flips, however incurs an overhead of 8.4%. Extra principled mitigations, similar to per-row activation counters, ought to cease Rowhammer assaults utterly, they are saying.

Phoenix was disclosed to SK Hynix, CPU distributors, and main cloud suppliers in early June. Final week, AMD launched BIOS updates to deal with CVE-2025-6202 in shopper machines, the researchers observe.

Associated: VMScape: Lecturers Break Cloud Isolation With New Spectre Assault

Associated: AI Techniques Weak to Immediate Injection by way of Picture Scaling Assault

Associated: Hybrid Networks Require an Built-in On-prem and Cloud Safety Technique

Associated: Webcast Video: Rethinking Endpoint Hardening for Right this moment’s Assault Panorama

Security Week News Tags:Attack, DDR5, Demonstrated, Rowhammer

Post navigation

Previous Post: Apple Backports Fix for CVE-2025-43300 Exploited in Sophisticated Spyware Attack
Next Post: Neon Cyber Emerges from Stealth, Shining a Light into the Browser

Related Posts

750,000 Impacted by Data Breach at The Alcohol & Drug Testing Service Security Week News
Iranian Man Pleads Guilty to Role in Baltimore Ransomware Attack Security Week News
437,000 Impacted by Ascension Health Data Breach Security Week News
Sesame Workshop Regains Control of Elmo’s Hacked X Account After Racist Posts Security Week News
Arch Linux Project Responding to Week-Long DDoS Attack Security Week News
UK’s Ransomware Payment Ban: Bold Strategy or Dangerous Gamble? Security Week News

Categories

  • Cyber Security News
  • How To?
  • Security Week News
  • The Hacker News

Recent Posts

  • SlopAds Fraud Ring Exploits 224 Android Apps to Drive 2.3 Billion Daily Ad Bids
  • KillSec Ransomware Attacking Healthcare Industry IT Systems
  • Security Analytics Firm Vega Emerges From Stealth With $65M in Funding 
  • Ray Security Emerges From Stealth With $11M to Bring Real-Time, AI-Driven Data Protection
  • Security Industry Skeptical of Scattered Spider-ShinyHunters Retirement Claims

Pages

  • About Us – Contact
  • Disclaimer
  • Privacy Policy
  • Terms and Rules

Archives

  • September 2025
  • August 2025
  • July 2025
  • June 2025
  • May 2025

Recent Posts

  • SlopAds Fraud Ring Exploits 224 Android Apps to Drive 2.3 Billion Daily Ad Bids
  • KillSec Ransomware Attacking Healthcare Industry IT Systems
  • Security Analytics Firm Vega Emerges From Stealth With $65M in Funding 
  • Ray Security Emerges From Stealth With $11M to Bring Real-Time, AI-Driven Data Protection
  • Security Industry Skeptical of Scattered Spider-ShinyHunters Retirement Claims

Pages

  • About Us – Contact
  • Disclaimer
  • Privacy Policy
  • Terms and Rules

Categories

  • Cyber Security News
  • How To?
  • Security Week News
  • The Hacker News