Tech Wavo
  • Home
  • Technology
  • Computers
  • Gadgets
  • Mobile
  • Apps
  • News
  • Financial
  • Stock
Tech Wavo
No Result
View All Result

New Phoenix RowHammer attack cracks open DDR5 memory defenses in minutes

Tech Wavo by Tech Wavo
September 16, 2025
in Computers
0




  • Phoenix RowHammer variant affects DDR5 desktop systems, bypassing all known mitigations on SK Hynix chips
  • Attackers can gain root access and steal RSA keys within minutes using default system settings
  • Researchers recommend tripling refresh rates, as DRAM devices cannot be patched and remain vulnerable long-term

Standard, production-grade desktop systems were, for the first time ever, found vulnerable to a variant of RowHammer, a hardware-based security vulnerability affecting DDR5 chips.

RowHammer affects Dynamic Random-Access Memory (DRAM) chips and allows attackers to manipulate memory contents by repeatedly accessing – “hammering” – a specific row of memory cells.

This causes electrical interference that can flip bits in adjacent rows, without actually accessing those rows, and results in privilege escalation, remote exploits, and different mobile vulnerabilities.


You may like

Privilege escalation and root access

The vulnerability was first spotted more than a decade ago, and has been addressed through patches multiple times. However, as RAM chips get better – and memory cells get squeezed closer together – the risk of RowHammer attacks increases.

The latest discovery is called Phoenix, and is tracked as CVE-2025-6202. It was given a severity score of 7.1/10 (high), and successfully bypasses all known mitigations on chips built by South Korean semiconductor manufacturer SK Hynix.

“We have proven that reliably triggering RowHammer bit flips on DDR5 devices from SK Hynix is possible on a larger scale,” ETH Zürich said. “We also proved that on-die ECC does not stop RowHammer, and RowHammer end-to-end attacks are still possible with DDR5.”

The researchers are claiming they can trigger privilege escalation and gain root access on a DDR5 system with default settings in less than two minutes. Practical use includes stealing RSA-2048 keys of a co-located virtual machine, thus breaking SSH authentication. A separate scenario includes using the sudo binary to escalate local privileges to the root user.

Sign up to the TechRadar Pro newsletter to get all the top news, opinion, features and guidance your business needs to succeed!

“As DRAM devices in the wild cannot be updated, they will remain vulnerable for many years,” the analysts said in the paper. “We recommend increasing the refresh rate to 3x, which stopped Phoenix from triggering bit flips on our test systems.” In this context, it is perhaps worth mentioning that after RowHammer was first disclosed in 2014, vendors like Intel and DRAM manufacturers introduced increased refresh rates and target row refresh (TRR) mechanisms as mitigation measures.

Via The Hacker News

You might also like

Previous Post

Hades returns to Game Pass on September 19

Next Post

Tesla is recalling Powerwall 2 batteries over fire risk

Next Post
Tesla is recalling Powerwall 2 batteries over fire risk

Tesla is recalling Powerwall 2 batteries over fire risk

Leave a Reply Cancel reply

Your email address will not be published. Required fields are marked *

iPhone 17 review: Closer to Pro

by Tech Wavo
September 18, 2025
0
iPhone 17 review: Closer to Pro
Computers

For years, the “regular” iPhone received hand-me-downs from the Pro models. This was less so with the iPhone 16 and...

Read more

Cybercriminals Have a Weird New Way to Target You With Scam Texts

by Tech Wavo
September 18, 2025
0
Cybercriminals Have a Weird New Way to Target You With Scam Texts
Computers

Because blasters operate outside of traditional mobile networks, the messages they send are not subject to the security measures that...

Read more

ChatGPT is changing the way we communicate — here’s how you can avoid speaking like AI in public

by Tech Wavo
September 18, 2025
0
ChatGPT is changing the way we communicate — here’s how you can avoid speaking like AI in public
Computers

ChatGPT and other LLMs (large language models) are designed to sound like us. Trained on vast amounts of human writing...

Read more

AI Psychosis Is Rarely Psychosis at All

by Tech Wavo
September 18, 2025
0
AI Psychosis Is Rarely Psychosis at All
Computers

A new trend is emerging in psychiatric hospitals. People in crisis are arriving with false, sometimes dangerous beliefs, grandiose delusions,...

Read more

Site links

  • Home
  • About Us
  • Contact Us
  • Privacy Policy
  • Terms of use
  • Home
  • About Us
  • Contact Us
  • Privacy Policy
  • Terms of use

No Result
View All Result
  • Home
  • Technology
  • Computers
  • Gadgets
  • Mobile
  • Apps
  • News
  • Financial
  • Stock