New Phoenix Rowhammer Attack Frags Open DDR5 Memory Defenses in a few minutes


  • The Phoenix Rowhammer variant affects DDR5 office systems, bypassing all the attenuations known on the SK HYNIX fleas
  • The attackers can obtain root access and steal the RSA keys in a few minutes using the default system settings
  • Researchers recommend cooling prices because DRAM devices cannot be corrected and remain vulnerable in the long term

Standard quality of production office systems were, for the first time, found vulnerable to a variant of Rowhammer, a safety vulnerability based on equipment affecting DDR5 fleas.

Rowhammer affects the dynamic random access memory (DRAM) and allows attackers to manipulate the content of the memory by accessing several times – “hammering” – a specific line of memory cells.

Leave a Comment

Your email address will not be published. Required fields are marked *

Scroll to Top