Researchers from ETH Zurich and Google have developed a new Rowhammer attack variant named Phoenix, which successfully bypasses DDR5 memory chip protections, allowing attackers to flip bits and escalate privileges. Despite defenses like Target Row Refresh (TRR), the attack exploits specific refresh intervals, demonstrating vulnerabilities across all tested DDR5 memory modules. The findings highlight a critical security risk affecting DIMM RAM produced from 2021 to 2024, with practical implications for data integrity and system security.
rowhammer ✓
security ✓
dd5 ✓
+ attack
vulnerability ✓