New Phoenix RowHammer attack cracks open DDR5 memory defenses in minutes




  • Phoenix RowHammer variant affects DDR5 desktop systems, bypassing all known mitigations on SK Hynix chips
  • Attackers can gain root access and steal RSA keys within minutes using default system settings
  • Researchers recommend tripling refresh rates, as DRAM devices cannot be patched and remain vulnerable long-term

Standard, production-grade desktop systems were, for the first time ever, found vulnerable to a variant of RowHammer, a hardware-based security vulnerability affecting DDR5 chips.

RowHammer affects Dynamic Random-Access Memory (DRAM) chips and allows attackers to manipulate memory contents by repeatedly accessing – “hammering” – a specific row of memory cells.

https://cdn.mos.cms.futurecdn.net/i7SC5YcQsZK2BikBBjp94W.jpg



Source link

Latest articles

spot_imgspot_img

Related articles

spot_imgspot_img