Start writing hereResearchers from ETH Zürich and Google have revealed a new RowHammer variant, Phoenix (CVE-2025-6202), that bypasses advanced DDR5 protections in SK Hynix memory chips. Even with ECC enabled, attackers can trigger memory bit flips and gain root access in just 109 seconds.
This vulnerability affects DDR5 modules made between 2021–2024 and could allow stealing encryption keys or escalating privileges. Increasing refresh rates 3x can prevent this attack. As DRAM cannot be patched, this issue may persist for years.
Stay with us — where every update means stronger security!
For Cybersecurity Services and Solutions, please visit itkart.io
#itkart #EDR #XDR #VAPT #VAPTsolutions #ITKART #SOC247 #VAPTservices #ITKart #CybersecurityServices #Cybersecurity #ITkart #CybersecuritySolutions #VulnerabilityAssessment #PenetrationTesting #SecurityOperationsCenter #itkartacademy #CyberSecurity #MemoryAttack #RowHammer #DDR5 #PhoenixAttack #ECCBypass #PrivilegeEscalation #DataSecurity #HackingNews #TechUpdate #ITkart...