VulnerabilitiesHIGH

GPUBreach - New Attack Enables System Takeover via GPU

Featured image for GPUBreach - New Attack Enables System Takeover via GPU
#GPUBreach#Rowhammer#NVIDIA#GDDR6#Privilege Escalation

Original Reporting

BCBleepingComputer·Bill Toulas

AI Intelligence Briefing

CyberPings AI·Reviewed by Rohit Rana
Severity LevelHIGH

Significant risk — action recommended within 24-48 hours

🎯

Basically, a new attack lets hackers take control of computers using GPU memory flaws.

Quick Summary

A new attack called GPUBreach allows hackers to exploit GPU memory vulnerabilities for system takeover. Users of NVIDIA GPUs are particularly at risk. It's crucial to stay updated on security measures.

What Happened

A groundbreaking attack known as GPUBreach has emerged, enabling attackers to exploit vulnerabilities in GPU memory, specifically targeting GDDR6. Developed by researchers at the University of Toronto, this attack leverages Rowhammer bit-flips to escalate privileges and potentially compromise entire systems.

How It Works

The GPUBreach attack induces bit flips in GPU memory, corrupting GPU page tables (PTEs). This allows an unprivileged CUDA kernel to gain arbitrary memory read/write access. By chaining this with memory-safety bugs found in the NVIDIA driver, attackers can escalate their privileges to gain full system control, even with Input-Output Memory Management Unit (IOMMU) protection enabled. This makes GPUBreach a particularly potent threat compared to previous attacks.

Who's Affected

The attack primarily affects systems utilizing NVIDIA GPUs with GDDR6 memory, such as the NVIDIA RTX A6000, commonly used in AI development and training workloads. Users of consumer GPUs without Error Correcting Code (ECC) memory are especially vulnerable, as GPUBreach remains unmitigated in those scenarios.

What Data Was Exposed

While specific data exposure details are not disclosed, the attack allows unauthorized access to sensitive GPU memory, which could lead to broader system compromise and data theft.

What You Should Do

To protect against GPUBreach:

  • Ensure your systems are running the latest NVIDIA drivers, which may include mitigations for this vulnerability.
  • Consider using GPUs equipped with ECC memory to reduce the risk of bit-flip attacks.
  • Monitor security advisories from NVIDIA and other relevant organizations for updates regarding this vulnerability.

Disclosure and Mitigations

The researchers reported their findings to major tech companies, including NVIDIA, Google, AWS, and Microsoft. Google acknowledged the report and awarded a bug bounty, while NVIDIA indicated it may update its security notice to address these new findings. Users are advised to not rely solely on IOMMU for protection, as it does not prevent GPUBreach.

This attack highlights the evolving landscape of hardware vulnerabilities, particularly in the realm of GPU technology. As these systems become more integral to various applications, understanding and mitigating such risks is crucial for maintaining security.

Pro Insight

🔒 Pro insight: GPUBreach exemplifies the growing sophistication of hardware attacks, necessitating immediate attention to driver vulnerabilities and memory management protocols.

Sources

Original Report

BCBleepingComputer· Bill Toulas
Read Original

Related Pings

HIGHVulnerabilities

CUPS Vulnerabilities - Remote Code Execution Risks Uncovered

Researchers uncovered critical vulnerabilities in CUPS, a popular printing system for Linux and Unix. These flaws can allow remote code execution, posing serious risks to many users. Organizations should take immediate action to secure their systems.

The Register Security·
HIGHVulnerabilities

BlueHammer Windows Zero-Day Exploit Leaked by Researcher

A researcher leaked the BlueHammer exploit for a Windows zero-day flaw, allowing privilege escalation. This poses a significant risk as no patch is currently available.

BleepingComputer·
HIGHVulnerabilities

CVE-2026-35616 - New Exploited Vulnerability Added by CISA

CISA has added a new vulnerability, CVE-2026-35616, to its catalog due to active exploitation. This flaw in Fortinet software poses significant risks to organizations. Timely remediation is essential to safeguard systems against attacks.

CISA Advisories·
MEDIUMVulnerabilities

is-localhost-ip 2.0.0 - SSRF Vulnerability Discovered

A new SSRF vulnerability in is-localhost-ip 2.0.0 has been discovered. This flaw could allow attackers to access sensitive internal data. Users should isolate the software and monitor for updates.

Exploit-DB·
CRITICALVulnerabilities

ASP.NET 8.0.10 - Critical Bypass Vulnerability Discovered

A critical vulnerability in ASP.NET 8.0.10 allows attackers to bypass authentication and hijack sessions. Immediate patching is crucial to secure affected systems.

Exploit-DB·
HIGHVulnerabilities

WordPress Madara - Local File Inclusion Vulnerability Alert

A Local File Inclusion vulnerability in WordPress Madara threatens user data. This affects all sites using the theme. Immediate action is necessary to prevent data breaches.

Exploit-DB·