Researchers at Switzerland’s ETH Zürich University have demonstrated that Rowhammer attacks can be carried out on systems powered by AMD Zen 2 and Zen 3 CPUs.
Rowhammer attacks, first introduced in 2014, entail continuously accessing a row of memory to produce bit flips in adjacent rows. An attacker might use this technique to get around memory protections, elevate privileges, and potentially decode sensitive data. Researchers have previously shown that assaults may be launched remotely and against mobile devices.
The researchers at ETH Zürich now claim to have performed bit flips on DDR4 memory, and for the first time ever, against DDR5.
Read More: ZenHammer Attack Targets DRAM on Systems With AMD CPUs
For more such updates follow us on Google News ITsecuritywire News. Please subscribe to our Newsletter for more updates.