Rowhammer Strikes Back: New DDR5 Vulnerability Uncovered by Google and ETH Zurich

Google and ETH Zurich researchers have uncovered a new Rowhammer vulnerability in DDR5 memory, dubbed “Phoenix”. This attack, though complex and resource-intensive, can compromise data integrity. While DDR5 was thought to be more resistant, this discovery highlights ongoing security challenges in memory technology.

Pro Dashboard

Hot Take:

DDR5 memory vulnerabilities are like glitter at a craft party – just when you think you’ve cleaned it all up, more of it appears in the most unexpected places. Google’s researchers and ETH Zurich have discovered a new “Phoenix” Rowhammer attack to remind us that your memory’s safety is only as good as the silicon it’s etched on. As if we didn’t have enough to worry about with our memory lapses, now we’ve got to worry about our computer’s memory too!

Key Points:

– Google and ETH Zurich researchers discovered a new Rowhammer vulnerability in DDR5 memory.
– The attack, dubbed “Phoenix,” remains computationally expensive but effective.
– Per-Row Activation Counting (PRAC) was supposed to mitigate such attacks but hasn’t been applied to DDR5.
– The discovered attack has been labeled CVE-2025-6202 with a 7.1 CVSS rating.
– AMD has already responded with a BIOS update to protect its systems.

Membership Required

 You must be a member to access this content.

View Membership Levels
Already a member? Log in here
The Nimble Nerd
Confessional Booth of Our Digital Sins

Okay, deep breath, let's get this over with. In the grand act of digital self-sabotage, we've littered this site with cookies. Yep, we did that. Why? So your highness can have a 'premium' experience or whatever. These traitorous cookies hide in your browser, eagerly waiting to welcome you back like a guilty dog that's just chewed your favorite shoe. And, if that's not enough, they also tattle on which parts of our sad little corner of the web you obsess over. Feels dirty, doesn't it?