New Phoenix RowHammer attack cracks open DDR5 memory defenses in minutes




  • Phoenix RowHammer variant affects DDR5 desktop systems, bypassing all known mitigations on SK Hynix chips
  • Attackers can gain root access and steal RSA keys within minutes using default system settings
  • Researchers recommend tripling refresh rates, as DRAM devices cannot be patched and remain vulnerable long-term

Standard, production-grade desktop systems were, for the first time ever, found vulnerable to a variant of RowHammer, a hardware-based security vulnerability affecting DDR5 chips.

RowHammer affects Dynamic Random-Access Memory (DRAM) chips and allows attackers to manipulate memory contents by repeatedly accessing – “hammering” – a specific row of memory cells.



Source link

Leave a Reply

Translate »
Share via
Copy link