Researchers from ETH Zürich and Google have identified a new RowHammer attack variant called Phoenix that can bypass advanced protections on DDR5 memory chips from SK Hynix. This vulnerability enables privilege escalation and data corruption despite existing mitigation measures. #RowHammer #DDR5 #SKHynix #PrivilegeEscalation
Keypoints
- The Phoenix RowHammer variant targets DDR5 memory chips and can bypass existing protections.
- Researchers demonstrated that on-die ECC and TRR are ineffective against this advanced attack.
- The attack can achieve privilege escalation on a standard desktop system within 109 seconds.
- Environmental factors like temperature and voltage influence the vulnerability to RowHammer.
- Increasing the refresh rate to three times the standard can mitigate the Phoenix attack.
Read More: https://thehackernews.com/2025/09/phoenix-rowhammer-attack-bypasses.html