Phoenix RowHammer Attack Bypasses Advanced DDR5 Memory Protections in 109 Seconds

Source: The Hacker News

The research indicates that the Phoenix attack (CVE-2025-6202) exploits vulnerabilities in DDR5 memory chips produced by SK Hynix. What makes this discovery significant is its ability to bypass existing protections, which were thought to secure these chips against RowHammer attacks.

As DDR5 becomes more common in modern computing environments, the implications of this finding are extensive. Organizations utilizing DDR5 technology must reconsider their security frameworks to mitigate potential risks. Moreover, this development underscores the need for ongoing vigilance in memory security as attackers develop increasingly sophisticated methods to exploit hardware vulnerabilities.

👉 Pročitaj original: The Hacker News