Skip to Content

Phoenix Attack Cracks DDR5 Memory Protections in 109 Seconds

7 ફેબ્રુઆરી, 2026 by
Phoenix Attack Cracks DDR5 Memory Protections in 109 Seconds
Nilmay System, Nehal Patel

Start writing hereResearchers from ETH Zürich and Google have revealed a new RowHammer variant, Phoenix (CVE-2025-6202), that bypasses advanced DDR5 protections in SK Hynix memory chips. Even with ECC enabled, attackers can trigger memory bit flips and gain root access in just 109 seconds.


This vulnerability affects DDR5 modules made between 2021–2024 and could allow stealing encryption keys or escalating privileges. Increasing refresh rates 3x can prevent this attack. As DRAM cannot be patched, this issue may persist for years.


Stay with us — where every update means stronger security!


For Cybersecurity Services and Solutions, please visit itkart.io


#itkart #EDR #XDR #VAPT #VAPTsolutions #ITKART #SOC247 #VAPTservices #ITKart #CybersecurityServices #Cybersecurity #ITkart #CybersecuritySolutions #VulnerabilityAssessment #PenetrationTesting #SecurityOperationsCenter #itkartacademy #CyberSecurity #MemoryAttack #RowHammer #DDR5 #PhoenixAttack #ECCBypass #PrivilegeEscalation #DataSecurity #HackingNews #TechUpdate #ITkart...

Agentless Backup for Nutanix AHV in Acronis Cyber Protect Cloud