Skip to main content
DashboardThreatsMapFeedsAPI
reconnecting
Press slash or control plus K to focus the search. Use the arrow keys to navigate results and press enter to open a threat.
Reconnecting to live updates…

Phoenix: Rowhammer that works on DDR5 | Kaspersky official blog

0
Medium
Vulnerability
Published: Fri Oct 03 2025 (10/03/2025, 16:01:41 UTC)
Source: Kaspersky Security Blog

Description

Phoenix is a new variant of the Rowhammer attack that targets DDR5 memory modules, demonstrating that even the latest memory technologies remain vulnerable. By reverse-engineering the Target Row Refresh (TRR) defense mechanism, researchers found timing windows where protections weaken, allowing precise bit flips in memory. The attack enables arbitrary memory read/write, theft of private encryption keys, and privilege escalation on Linux systems. While requiring detailed knowledge of the target environment and specific hardware conditions (notably AMD Zen 2/3 CPUs with certain DDR5 modules), the attack is practical and can complete within seconds to minutes. The attack currently affects DDR5 modules from SK Hynix, a major market player. Mitigations include reducing refresh intervals, using ECC memory, adopting fine granularity refresh techniques, and moving away from proprietary security through obscurity. European organizations using affected hardware, especially in critical infrastructure and enterprises relying on AMD platforms, face risks to confidentiality, integrity, and availability. Countries with high adoption of AMD-based servers and SK Hynix DDR5 modules are most at risk. The attack is medium severity due to its complexity and constrained scenarios but remains a significant concern for memory security.

AI-Powered Analysis

AILast updated: 10/07/2025, 01:33:22 UTC

Technical Analysis

Phoenix is an advanced Rowhammer attack variant targeting DDR5 memory modules, first demonstrated by ETH Zurich researchers in 2025. Rowhammer exploits electrical interference between adjacent memory cells to induce bit flips, potentially altering critical data. DDR5 modules incorporate Target Row Refresh (TRR) as a hardware defense, which monitors aggressive row accesses and refreshes adjacent rows to prevent corruption. Phoenix bypasses TRR by exploiting timing windows: after 128 TRR-tracked accesses, a 64-access window occurs where defenses weaken, and a second window appears after 2608 refresh intervals. The attack uses dummy memory accesses to lull TRR protections, then performs precise hammering to flip bits in targeted memory cells. Researchers tested 15 DDR5 modules from SK Hynix, confirming reliable exploitation of arbitrary memory read/write across all tested modules, with partial success stealing RSA-2048 private keys and bypassing Linux sudo protections for privilege escalation. The attack requires detailed knowledge of target memory layout and software, and is constrained to AMD Zen 2 and Zen 3 CPU platforms paired with vulnerable DDR5 modules. Exploitation times range from seconds to minutes. Proposed mitigations include reducing refresh intervals (at cost of power/heat), deploying ECC memory, implementing fine granularity refresh in memory controllers, and advocating transparency in security mechanisms rather than proprietary obscurity. Phoenix demonstrates that DDR5 is not immune to Rowhammer, challenging assumptions about memory security and prompting renewed focus on hardware-level defenses.

Potential Impact

For European organizations, Phoenix poses a tangible risk to systems using vulnerable DDR5 memory modules, particularly those paired with AMD Zen 2 or Zen 3 CPUs. The ability to induce bit flips can lead to arbitrary memory read/write, enabling attackers to steal sensitive data such as private encryption keys, escalate privileges, and potentially disrupt system stability. This threatens confidentiality, integrity, and availability of critical systems, especially in sectors like finance, government, healthcare, and critical infrastructure where data protection is paramount. The attack's reliance on specific hardware and detailed target knowledge limits its widespread exploitation but does not eliminate risk to high-value targets. Enterprises deploying SK Hynix DDR5 modules in servers or workstations may face increased exposure. The medium severity reflects the attack's complexity and constrained scenarios but underscores the need for vigilance and proactive mitigation. Failure to address these vulnerabilities could lead to data breaches, unauthorized access, and operational disruptions within European organizations.

Mitigation Recommendations

European organizations should implement a multi-layered defense strategy tailored to Phoenix's technical specifics. First, verify hardware inventory to identify systems using SK Hynix DDR5 modules paired with AMD Zen 2 or Zen 3 CPUs and prioritize them for mitigation. Deploy ECC memory where possible to detect and correct bit flips, reducing attack success probability. Collaborate with hardware vendors to ensure firmware and microcode updates incorporate fine granularity refresh protections and improved TRR algorithms. Adjust memory refresh intervals to shorter durations to reduce vulnerability windows, balancing power and thermal considerations. Harden Linux systems by applying the latest kernel patches and security configurations to mitigate privilege escalation vectors like sudo bypass. Employ runtime integrity monitoring to detect anomalous memory behavior indicative of Rowhammer exploitation. Advocate for transparency from hardware manufacturers regarding TRR implementations to enable independent security validation. Finally, incorporate Phoenix-specific threat scenarios into incident response and penetration testing exercises to improve detection and response capabilities.

Need more detailed analysis?Get Pro

Technical Details

Article Source
{"url":"https://www.kaspersky.com/blog/phoenix-rowhammer-attack/54528/","fetched":true,"fetchedAt":"2025-10-07T01:33:06.536Z","wordCount":1559}

Threat ID: 68e46dd46a45552f36e95747

Added to database: 10/7/2025, 1:33:08 AM

Last enriched: 10/7/2025, 1:33:22 AM

Last updated: 10/7/2025, 9:19:22 AM

Views: 3

Community Reviews

0 reviews

Crowdsource mitigation strategies, share intel context, and vote on the most helpful responses. Sign in to add your voice and help keep defenders ahead.

Sort by
Loading community insights…

Want to contribute mitigation steps or threat intel context? Sign in or create an account to join the community discussion.

Actions

PRO

Updates to AI analysis are available only with a Pro account. Contact root@offseq.com for access.

Please log in to the Console to use AI analysis features.

Need enhanced features?

Contact root@offseq.com for Pro access with improved analysis and higher rate limits.

Latest Threats