URL has been copied successfully!
Phoenix RowHammer Attack Bypasses Advanced DDR5 Memory Protections in 109 Seconds
URL has been copied successfully!

Collecting Cyber-News from over 60 sources

Phoenix RowHammer Attack Bypasses Advanced DDR5 Memory Protections in 109 Seconds

A team of academics from ETH Zürich and Google has discovered a new variant of a RowHammer attack targeting Double Data Rate 5 (DDR5) memory chips from South Korean semiconductor vendor SK Hynix.The RowHammer attack variant, codenamed Phoenix (CVE-2025-6202, CVSS score: 7.1), is capable of bypassing sophisticated protection mechanisms put in place to resist the attack.”We have proven that

First seen on thehackernews.com

Jump to article: thehackernews.com/2025/09/phoenix-rowhammer-attack-bypasses.html

Loading

Share via Email
Share on Facebook
Tweet on X (Twitter)
Share on Whatsapp
Share on LinkedIn
Share on Xing
Copy link