Phoenix RowHammer Attack Bypasses Advanced DDR5 Memory Protections in 109 Seconds

Phoenix RowHammer Attack Bypasses Advanced DDR5 Memory Protections in 109 Seconds

Researchers from ETH Zürich and Google have identified a new RowHammer attack variant called Phoenix that can bypass advanced protections on DDR5 memory chips from SK Hynix. This vulnerability enables privilege escalation and data corruption despite existing mitigation measures. #RowHammer #DDR5 #SKHynix #PrivilegeEscalation

Keypoints

  • The Phoenix RowHammer variant targets DDR5 memory chips and can bypass existing protections.
  • Researchers demonstrated that on-die ECC and TRR are ineffective against this advanced attack.
  • The attack can achieve privilege escalation on a standard desktop system within 109 seconds.
  • Environmental factors like temperature and voltage influence the vulnerability to RowHammer.
  • Increasing the refresh rate to three times the standard can mitigate the Phoenix attack.

Read More: https://thehackernews.com/2025/09/phoenix-rowhammer-attack-bypasses.html