News: 1758086108

  ARM Give a man a fire and he's warm for a day, but set fire to him and he's warm for the rest of his life (Terry Pratchett, Jingo)

Ruh-roh. DDR5 memory vulnerable to new Rowhammer attack

(2025/09/17)


Researchers from Google and Swiss university ETH Zurich have found a new class of Rowhammer vulnerability that could allow attackers to access info stored in DDR5 memory.

As Google explains in its [1]post on the discovery, DRAM stores data as electrical charges in small “cells” of memory. Those charges leak over time, corrupting data. Computer scientists have known this for ages, and the controllers that manage memory therefore periodically refresh cells to ensure memory remains reliable.

Infosec types with friendly and/or adversarial inclinations noticed that behavior and wondered what would happen if they repeatedly accessed specific rows of memory cells. They learned that by “hammering” those rows of cells with many access requests it’s possible to corrupt data in adjacent cells, degrade system performance, or even achieve privilege escalation.

[2]

Rowhammer is a known problem and infosec researchers long ago developed defenses that system builders and memory-makers adopted. Last year, standards body the JEDEC Solid State Technology Association introduced a new DRAM data integrity measure called Per-Row Activation Counting (PRAC) that looks for the sort of activity involved in a Rowhammer attack and pauses traffic to stymie hostile action.

[3]

[4]

Google’s researchers, however, assert that systems that include DDR5 have not employed PRAC. The web giant also created a pair of tools to test DDR5 modules for susceptibility to Rowhammer.

[5]Spectre haunts CPUs again: VMSCAPE vulnerability leaks cloud secrets

[6]ZenHammer comes down on AMD Zen 2 and 3 systems

[7]Hot fuzz: Cascade finds dozens of RISC-V chip bugs using random data storm

[8]Nearly every AMD CPU since 2017 vulnerable to Inception data-leak attacks

Researchers at ETH Zurich put those tools to work and [9]found a new form of Rowhammer attack that works on DDR5 from SK Hynix, the world’s largest memory-maker.

The attack, called “Phoenix”, isn’t simple and is computationally expensive. But it works.

And that’s worrying because the [10]paper [PDF] that describes the joint Google/ETH research opens by observing “DDR5 has shown an increased resistance to Rowhammer attacks in production settings. Surprisingly, DDR5 achieves this without additional refresh management commands.”

[11]

Google and ETH Zurich found their Rowhammer variant using a machine powered by an AMD Zen 4 processor and SK Hynix DDR5 and will attempt to replicate their work on memory and CPUs from other vendors.

If the researchers succeed it’s not a disgrace for impacted manufacturers because Rowhammer-style attacks are hard to defeat, with recent victims including [12]Nvidia , [13]DDR4 and everyone’s privacy thanks to a Rowhammer [14]variant that makes it possible to fingerprint computing devices.

The attack discovered by Google and ETH Zurich is now known as [15]CVE-2025-6202 and earned a 7.1 CVSS rating.

[16]

ETH Zurich says it conducted responsible disclosure of Phoenix that saw it inform SK Hynix, CPU vendors, and major cloud providers on June 6, 2025. AMD told the researchers it made a BIOS update to protect systems that use its processors. More information, including the source code for all the experiments and the exploit, can be found [17]here . ®

Get our [18]Tech Resources



[1] https://security.googleblog.com/2025/09/supporting-rowhammer-research-to.html

[2] https://pubads.g.doubleclick.net/gampad/jump?co=1&iu=/6978/reg_security/research&sz=300x50%7C300x100%7C300x250%7C300x251%7C300x252%7C300x600%7C300x601&tile=2&c=2aMqGuWaeLneKnntZzk3NLgAAAwI&t=ct%3Dns%26unitnum%3D2%26raptor%3Dcondor%26pos%3Dtop%26test%3D0

[3] https://pubads.g.doubleclick.net/gampad/jump?co=1&iu=/6978/reg_security/research&sz=300x50%7C300x100%7C300x250%7C300x251%7C300x252%7C300x600%7C300x601&tile=4&c=44aMqGuWaeLneKnntZzk3NLgAAAwI&t=ct%3Dns%26unitnum%3D4%26raptor%3Dfalcon%26pos%3Dmid%26test%3D0

[4] https://pubads.g.doubleclick.net/gampad/jump?co=1&iu=/6978/reg_security/research&sz=300x50%7C300x100%7C300x250%7C300x251%7C300x252%7C300x600%7C300x601&tile=3&c=33aMqGuWaeLneKnntZzk3NLgAAAwI&t=ct%3Dns%26unitnum%3D3%26raptor%3Deagle%26pos%3Dmid%26test%3D0

[5] https://www.theregister.com/2025/09/11/vmscape_spectre_vulnerability/

[6] https://www.theregister.com/2024/03/25/zenhammer_comes_down_on_amd/

[7] https://www.theregister.com/2023/10/24/cascade_fuzzer_zurich/

[8] https://www.theregister.com/2023/08/09/amd_inception/

[9] https://comsec.ethz.ch/research/dram/phoenix/

[10] https://comsec-files.ethz.ch/papers/phoenix_sp26.pdf

[11] https://pubads.g.doubleclick.net/gampad/jump?co=1&iu=/6978/reg_security/research&sz=300x50%7C300x100%7C300x250%7C300x251%7C300x252%7C300x600%7C300x601&tile=4&c=44aMqGuWaeLneKnntZzk3NLgAAAwI&t=ct%3Dns%26unitnum%3D4%26raptor%3Dfalcon%26pos%3Dmid%26test%3D0

[12] https://www.theregister.com/2025/07/13/infosec_in_brief/

[13] https://www.theregister.com/2024/03/25/zenhammer_comes_down_on_amd/

[14] https://www.theregister.com/2023/07/05/rowhammer_memory_identification/

[15] https://nvd.nist.gov/vuln/detail/CVE-2025-6202

[16] https://pubads.g.doubleclick.net/gampad/jump?co=1&iu=/6978/reg_security/research&sz=300x50%7C300x100%7C300x250%7C300x251%7C300x252%7C300x600%7C300x601&tile=3&c=33aMqGuWaeLneKnntZzk3NLgAAAwI&t=ct%3Dns%26unitnum%3D3%26raptor%3Deagle%26pos%3Dmid%26test%3D0

[17] https://github.com/comsec-group/phoenix

[18] https://whitepapers.theregister.com/



Ah, the memories...

Yorick Hunt

... I have "fond" (for the most negative connotations of that word) memories of RAM issues back in the late '70s, from so-called " [1]alpha particle degeneration ."

I remember back then there being a strong push towards static RAM for critical implementations, but marketing soon overcame the will of the greybeards.

[1] https://en.m.wikipedia.org/wiki/Soft_error

Re: Ah, the memories...

that one in the corner

Ok, I'll bite - who, aside from you, uses/used the phrase "alpha particle degeneration" (your comment was a Googlewhack - well, Duckduckwhack - for the phrase)?

And, aside from a bit of hyperbole (using "degeneration" implies something permanent or long-lasting, so one would think it referred to the physical structure of the memory degenerating, not just the stored charge, as we expect the charge to be a fleeting thing that'll be deliberately changing at a pace) what is inaccurate or misleading about that phrase to warrant using "so called"? Especially when you link to an article that actually describes how alpha particles from packaging cause data errors.

> marketing soon overcame the will of the greybeards

Marketing? Not Finance, looking at the BOM costs? Did Marketing really care about making sure the User knew you were using cheaper DRAM?

Yours, etc, Mr Grumpy-hasn't-his-cofee-yet

The Lord prefers common-looking people. That is the reason that He makes
so many of them.
-- Abraham Lincoln