Phoenix RowHammer Attack Bypasses Advanced DDR5 Memory Protections in 109 Seconds

A team of academics from ETH Zürich and Google has discovered a new variant of a RowHammer attack targeting Double Data Rate 5 (DDR5) memory chips from South Korean semiconductor vendor SK Hynix.
The RowHammer attack variant, codenamed Phoenix (CVE-2025-6202, CVSS score: 7.1), is capable of bypassing sophisticated protection mechanisms put in place to resist the attack.
“We have proven that

Total
0
Shares
Leave a Reply

Your email address will not be published. Required fields are marked *

Previous Post

6 Browser-Based Attacks Security Teams Need to Prepare For Right Now

Next Post

Securing the Agentic Era: Introducing Astrix’s AI Agent Control Plane

Related Posts
Total
0
Share