Skip to content
  • Blog Home
  • Cyber Map
  • About Us – Contact
  • Disclaimer
  • Terms and Rules
  • Privacy Policy
Cyber Web Spider Blog – News

Cyber Web Spider Blog – News

Globe Threat Map provides a real-time, interactive 3D visualization of global cyber threats. Monitor DDoS attacks, malware, and hacking attempts with geo-located arcs on a rotating globe. Stay informed with live logs and archive stats.

  • Home
  • Cyber Map
  • Cyber Security News
  • Security Week News
  • The Hacker News
  • How To?
  • Toggle search form

Rowhammer Attack Demonstrated Against DDR5

Posted on September 16, 2025September 16, 2025 By CWS

A bunch of safety researchers from the ETH Zurich college and Google have demonstrated a sensible Rowhammer assault in opposition to DDR5.

Dubbed Phoenix and tracked as CVE-2025-6202, the DDR5 Rowhammer assault was discovered to be efficient in opposition to 15 gadgets from SK Hynix, the most important DRAM producer.

As a part of a Rowhammer assault, a DRAM reminiscence row is accessed repeatedly to trigger electrical interference resulting in bit flips in adjoining areas. This might result in elevation of privileges, information corruption, information leakage, and in breaking reminiscence isolation in digital environments.

After greater than a decade of identified Rowhammer assaults focusing on CPUs and CPU-based reminiscence, a gaggle of College of Toronto researchers this 12 months demonstrated that such assaults are doable and sensible in opposition to GPUs as properly.

The newly devised Phoenix assault exhibits that, regardless of its extra subtle in-DRAM Goal Row Refresh (TRR) mechanisms meant to forestall Rowhammer assaults, DDR5 too is weak.

To show that, 4 ETH Zurich teachers and two Google researchers reverse-engineered the TRR schemes in DDR5, discovering {that a} profitable assault must “exactly observe hundreds of refresh operations”.

Of their paper (PDF), the researchers clarify that the protections DDR5 comes with require considerably longer Rowhammer patterns to be bypassed, and that these patterns want to stay in-sync with hundreds of refresh instructions.

Phoenix, nonetheless, was designed to resynchronize the sample when missed refresh operations are detected, thus triggering bit flips that allowed the researchers to create a privilege escalation exploit and acquire root on a commodity DDR5 system with default settings.Commercial. Scroll to proceed studying.

“We consider Phoenix on 15 DDR5 DIMMs from SK Hynix and present that it will possibly set off bit flips on all of them. We additionally exhibit that the bit flips are exploitable by constructing the primary Rowhammer privilege escalation exploit operating in default settings on a PC in as little as 109 seconds,” the researchers observe.

The researchers say they restricted their work to SK Hynix gadgets because of the intensive effort of reverse engineering the carried out mitigations, and level out that DDR5 gadgets from different producers shouldn’t be thought of protected in opposition to Rowhammer assaults.

Tripling the refresh charge, the researchers say, prevents Phoenix from triggering bit flips, however incurs an overhead of 8.4%. Extra principled mitigations, similar to per-row activation counters, ought to cease Rowhammer assaults utterly, they are saying.

Phoenix was disclosed to SK Hynix, CPU distributors, and main cloud suppliers in early June. Final week, AMD launched BIOS updates to deal with CVE-2025-6202 in shopper machines, the researchers observe.

Associated: VMScape: Lecturers Break Cloud Isolation With New Spectre Assault

Associated: AI Techniques Weak to Immediate Injection by way of Picture Scaling Assault

Associated: Hybrid Networks Require an Built-in On-prem and Cloud Safety Technique

Associated: Webcast Video: Rethinking Endpoint Hardening for Right this moment’s Assault Panorama

Security Week News Tags:Attack, DDR5, Demonstrated, Rowhammer

Post navigation

Previous Post: Apple Backports Fix for CVE-2025-43300 Exploited in Sophisticated Spyware Attack
Next Post: Neon Cyber Emerges from Stealth, Shining a Light into the Browser

Related Posts

‘EchoLeak’ AI Attack Enabled Theft of Sensitive Data via Microsoft 365 Copilot Security Week News
UK Train Operator LNER Warns Customers of Data Breach Security Week News
Google Gemini Tricked Into Showing Phishing Message Hidden in Email  Security Week News
Gambling Tech Firm Bragg Discloses Cyberattack Security Week News
Bill Aims to Create National Strategy for Quantum Cybersecurity Migration Security Week News
Cellcom Service Disruption Caused by Cyberattack Security Week News

Categories

  • Cyber Security News
  • How To?
  • Security Week News
  • The Hacker News

Recent Posts

  • Security Industry Skeptical of Scattered Spider-ShinyHunters Retirement Claims
  • LG WebOS TV Vulnerability Let Attackers Bypass Authentication and Enable Full Device Takeover
  • New FileFix Variant Delivers StealC Malware Through Multilingual Phishing Site
  • WordPress Plugin Vulnerability Let Attackers Bypass Authentication via Social Login
  • Neon Cyber Emerges from Stealth, Shining a Light into the Browser

Pages

  • About Us – Contact
  • Disclaimer
  • Privacy Policy
  • Terms and Rules

Archives

  • September 2025
  • August 2025
  • July 2025
  • June 2025
  • May 2025

Recent Posts

  • Security Industry Skeptical of Scattered Spider-ShinyHunters Retirement Claims
  • LG WebOS TV Vulnerability Let Attackers Bypass Authentication and Enable Full Device Takeover
  • New FileFix Variant Delivers StealC Malware Through Multilingual Phishing Site
  • WordPress Plugin Vulnerability Let Attackers Bypass Authentication via Social Login
  • Neon Cyber Emerges from Stealth, Shining a Light into the Browser

Pages

  • About Us – Contact
  • Disclaimer
  • Privacy Policy
  • Terms and Rules

Categories

  • Cyber Security News
  • How To?
  • Security Week News
  • The Hacker News