New Phoenix Rowhammer Attack Cracks Open the DDR5 memory defenses in minutes




  • The Phoenix Rowhammer variant affects DDR5 desktop systems, without going through all known mitigations in SK Hynix chips
  • Attackers can get access to the root and steal RSA keys in minutes using the default system configuration
  • Researchers recommend tripling update rates, since DRAM devices cannot patch and continue to be vulnerable in the long term

Standard production desktop systems were found, for the first time, vulnerable to a Rowhammer variant, a hardware -based security vulnerability that affects DDR5 chips.

Rowhammer affects the dynamic chips of random access memory (DRAM) and allows the attackers to manipulate the content of the memory repeatedly accessing – “hammer” – a specific row of memory cells.

Leave a Comment

Your email address will not be published. Required fields are marked *