VulnerabilitiesHIGH

New Rowhammer Attacks - Full Control of Nvidia GPUs

Featured image for New Rowhammer Attacks - Full Control of Nvidia GPUs
ARArs Technica Security
RowhammerNvidia RTX 3060Nvidia RTX 6000GDDR6IOMMU
🎯

Basically, new attacks let hackers control computers using Nvidia graphics cards.

Quick Summary

New Rowhammer attacks exploit Nvidia GPUs, allowing attackers to gain complete control over host machines. This vulnerability poses significant risks for cloud environments. Users should take immediate action to secure their systems.

What Happened

Recent research has unveiled two new Rowhammer attacks targeting Nvidia's high-performance GPUs, specifically the RTX 3060 and RTX 6000. These attacks, named GDDRHammer and GeForge, allow attackers to gain full root control of host machines by exploiting vulnerabilities in GPU memory. This is particularly alarming given the widespread use of these GPUs in cloud environments, where they are often shared among multiple users.

The Flaw

The Rowhammer vulnerability exploits the susceptibility of memory hardware to bit flips, where stored bits in memory unexpectedly change from 0s to 1s or vice versa. This phenomenon has been known since 2014, but the recent attacks extend its impact from CPUs to GPUs. By hammering specific memory rows, attackers can manipulate memory access and escalate privileges.

What's at Risk

The implications of these attacks are severe. By successfully executing GDDRHammer or GeForge, an attacker can gain arbitrary read/write access to both GPU and CPU memory. This means they can potentially control the entire system, leading to data breaches, unauthorized access, and complete system compromise.

Technical Details

GDDRHammer, for instance, achieved an average of 129 bit flips per memory bank, marking a significant increase over previous attacks. It operates by manipulating the GPU's memory allocator, breaking the isolation of GPU page tables and allowing access to sensitive data. Similarly, GeForge manipulates the last-level page directory to achieve host privilege escalation.

Patch Status

Currently, the RTX 3060 and RTX 6000 are confirmed vulnerable. To mitigate these risks, users should enable IOMMU in their BIOS settings, which restricts GPU access to sensitive memory locations. Additionally, enabling Error Correcting Codes (ECC) on the GPU can provide another layer of protection, although this may come with performance trade-offs.

Immediate Actions

For users of Nvidia GPUs, the immediate steps include:

  • Check if your GPU is among the vulnerable models (RTX 3060 and RTX 6000).
  • Enable IOMMU in BIOS settings to restrict memory access.
  • Consider enabling ECC for additional protection against memory errors.

Conclusion

As these attacks demonstrate, the Rowhammer vulnerability has evolved significantly, now posing a serious threat to GPU security. With the rapid pace of GPU deployment, it is crucial for users and organizations to stay informed and implement necessary safeguards to protect their systems.

🔒 Pro insight: The evolution of Rowhammer attacks highlights the urgent need for integrated memory protection across CPU and GPU architectures.

Original article from

ARArs Technica Security· Dan Goodin
Read Full Article

Related Pings

CRITICALVulnerabilities

CVE-2025-55182 - Hackers Breach 766 Next.js Hosts

Hackers have exploited a critical vulnerability in Next.js, breaching 766 hosts and stealing sensitive credentials. Organizations must take swift action to mitigate risks and secure their systems.

The Hacker News·
HIGHVulnerabilities

OpenSSH Vulnerabilities - Security Advisory Released

OpenSSH has issued a security advisory for vulnerabilities in versions prior to 10.3. Users need to update to the latest version to protect their systems. This advisory highlights critical risks that could lead to unauthorized access. Stay secure by applying the necessary updates.

Canadian Cyber Centre Alerts·
HIGHVulnerabilities

Progress ShareFile - Security Vulnerability Advisory Released

Progress has issued a security advisory for ShareFile vulnerabilities. Users must update to versions v5.12.4 or later to protect their data. This is crucial for maintaining security.

Canadian Cyber Centre Alerts·
HIGHVulnerabilities

Mongoose Vulnerabilities - Cesanta Issues Security Advisory

Cesanta has issued a security advisory for Mongoose, affecting versions 7.0 to 7.20. Users must update to safeguard against vulnerabilities. Don't wait—protect your systems now!

Canadian Cyber Centre Alerts·
HIGHVulnerabilities

Cisco Patches Critical and High-Severity Vulnerabilities

Cisco has patched critical vulnerabilities that could allow attackers to bypass authentication and gain system access. Organizations using Cisco products are urged to update immediately to avoid risks.

Security Affairs·
CRITICALVulnerabilities

Critical Vulnerability Found in Claude Code After Source Leak

A critical vulnerability in Claude Code was discovered shortly after its source code leak. This flaw could allow attackers to bypass security measures and steal sensitive credentials, posing a significant risk. Developers must act quickly to protect their systems.

SecurityWeek·