Phoenix Rowhammer Attack: Unveiling DDR5 Memory Vulnerabilities

In a groundbreaking development, cybersecurity researchers have identified a new variant of the Rowhammer attack, termed Phoenix, capable of circumventing the advanced protections embedded within modern DDR5 memory chips. This discovery challenges the prevailing belief that DDR5 modules are impervious to such hardware-based exploits.

Understanding Rowhammer:

Rowhammer is a hardware vulnerability that exploits the physical properties of DRAM (Dynamic Random-Access Memory). By repeatedly accessing, or hammering, specific rows of memory cells, an attacker can induce electrical disturbances, leading to unintended bit flips in adjacent rows. These bit flips can corrupt data and potentially allow unauthorized privilege escalation.

Historically, Rowhammer attacks have targeted older memory generations like DDR3 and DDR4. In response, DDR5 was engineered with sophisticated in-DRAM Target Row Refresh (TRR) mechanisms designed to thwart such disturbances. These defenses were considered robust, as prior attempts to exploit Rowhammer on DDR5 systems had largely been unsuccessful.

The Emergence of Phoenix:

A collaborative effort between researchers from ETH Zurich and Google has unveiled that the TRR mechanisms in DDR5 chips, particularly those manufactured by SK Hynix, operate over more extended and intricate patterns compared to their DDR4 counterparts. To effectively bypass these defenses, an attack must synchronize with the multitude of periodic refresh commands issued by the memory controller.

Traditional synchronization methods proved inadequate, often missing refresh commands and losing alignment, rendering the attack ineffective. The Phoenix attack introduces a novel approach termed self-correcting synchronization. Instead of merely avoiding missed refresh commands, Phoenix detects when a refresh is missed and realigns its hammering pattern accordingly.

This adaptive technique enables the attack to maintain synchronization over extended periods, accumulating sufficient hammers to induce bit flips, even on standard commodity computers with default configurations.

Exploiting TRR Mechanisms:

By reverse-engineering the behavior of DDR5’s TRR mechanisms, the research team developed custom hammering patterns that exploit blind spots within the defense system. By targeting specific memory locations during intervals of reduced monitoring, the Phoenix attack effectively induces bit flips.

In rigorous testing, Phoenix successfully triggered bit flips across all 15 commercial DDR5 memory modules from SK Hynix, spanning manufacturing dates from 2021 to 2024. Leveraging these bit flips, the researchers crafted the first end-to-end Rowhammer exploit for DDR5, achieving root-level privileges on a test system in as little as 109 seconds. This vulnerability has been cataloged as CVE-2025-6202.

Disclosure and Mitigation:

The findings were responsibly disclosed to SK Hynix, CPU vendors, and major cloud service providers in June 2025. One proposed mitigation involved increasing the memory refresh rate by a factor of three, which effectively neutralized the attack. However, this solution introduced a significant performance overhead of 8.4%, posing challenges for practical implementation.

Implications for the Industry:

The emergence of the Phoenix attack underscores the necessity for hardware manufacturers to adopt transparent, verifiable security measures. Relying on proprietary or obscure mitigations can lead to a false sense of security, as determined adversaries may eventually uncover and exploit these defenses.

This development serves as a stark reminder that as technology evolves, so do the tactics of cyber adversaries. Continuous research, vigilance, and proactive security practices are paramount to safeguarding systems against emerging threats.