{"id":45166,"date":"2026-04-07T06:08:48","date_gmt":"2026-04-06T22:08:48","guid":{"rendered":"https:\/\/nuoya.nuoyayasuo.top\/index.php\/2026\/04\/07\/new-gpubreach-attack-enables-system-takeover-via-gpu-rowhammer\/"},"modified":"2026-04-07T06:08:48","modified_gmt":"2026-04-06T22:08:48","slug":"new-gpubreach-attack-enables-system-takeover-via-gpu-rowhammer","status":"publish","type":"post","link":"https:\/\/nuoya.nuoyayasuo.top\/index.php\/2026\/04\/07\/new-gpubreach-attack-enables-system-takeover-via-gpu-rowhammer\/","title":{"rendered":"New GPUBreach attack enables system takeover via GPU rowhammer"},"content":{"rendered":"\n<p style=\"text-align:center\"><img loading=\"lazy\" decoding=\"async\" height=\"900\" src=\"https:\/\/www.bleepstatic.com\/content\/hl-images\/2026\/04\/06\/GPU.jpg\" width=\"1600\" alt=\"New GPUBreach attack enables system takeover via GPU rowhammer\"><\/p>\n<p>A new attack, dubbed GPUBreach, can induce Rowhammer bit-flips on GPU GDDR6 memories to escalate privileges and lead to a full system compromise.<\/p>\n<p>GPUBreach was developed by a team of researchers at the University of Toronto, and full details will be presented at the upcoming IEEE Symposium on Security &amp; Privacy on April 13 in Oakland.<\/p>\n<p>The researchers demonstrated that Rowhammer-induced bit flips in GDDR6 can corrupt GPU page tables (PTEs) and grant&nbsp;arbitrary GPU memory read\/write access to an unprivileged CUDA kernel.<\/p>\n<div align=\"center\" style=\"width:98%; margin:0 auto; text-align:center; padding:4px; background:#f0f0f0; border:1px solid #ccc; border-radius:6px;\">  <a href=\"https:\/\/www.adaptivesecurity.com\/lp\/nb\/free-phishing-test?utm_source=display_network&amp;utm_medium=paid_display&amp;utm_campaign=2025_12_Linkedin_Social_NA_Brand_Awareness_Teachers_funding&amp;utm_id=701Rd00000ZoWjjIAF%2F&amp;utm_content=970_250\" rel=\"nofollow noopener\" target=\"_blank\"><img decoding=\"async\" src=\"https:\/\/www.bleepstatic.com\/c\/a\/as-Free-Phishing-970x250.jpg\" style=\"margin-top: 0px;\" alt=\"New GPUBreach attack enables system takeover via GPU rowhammer\"><\/a> <\/div>\n<p>An attacker may then chain this into a CPU-side escalation by exploiting memory-safety bugs in the NVIDIA driver, potentially leading to complete system compromise without the need to disable&nbsp;Input-Output Memory Management Unit (IOMMU)&nbsp;protection.<\/p>\n<div style=\"text-align:center\">\n<figure style=\"display:inline-block\"><img loading=\"lazy\" decoding=\"async\" height=\"224\" src=\"https:\/\/www.bleepstatic.com\/images\/news\/u\/1220909\/2026\/April\/steps.jpg\" width=\"900\" alt=\"New GPUBreach attack enables system takeover via GPU rowhammer\"><figcaption><strong>GPUBreach attack steps<\/strong><br \/><em>Source: University of Toronto<\/em><\/figcaption><\/figure>\n<\/div>\n<p>IOMMU is a hardware unit that protects against direct memory attacks. It controls and restricts how devices access memory by managing which memory regions are accessible to each device.<\/p>\n<p>Despite being an effective measure against most&nbsp;direct memory access (DMA) attacks,&nbsp;IOMMU&nbsp;does not stop GPUBreach.<\/p>\n<p>&ldquo;GPUBreach shows that GPU Rowhammer attacks can move beyond data corruption to real privilege escalation,&rdquo; the&nbsp;<a href=\"https:\/\/gpubreach.ca\/\" target=\"_blank\" rel=\"nofollow noopener\">researchers explain<\/a>.<\/p>\n<p>&ldquo;By corrupting GPU page tables, an unprivileged CUDA kernel can gain arbitrary GPU memory read\/write, and then chain that capability into CPU-side escalation by exploiting newly discovered memory-safety bugs in the NVIDIA driver.&rdquo;<\/p>\n<p>&ldquo;The result is system-wide compromise up to a root shell, without disabling IOMMU, unlike contemporary works, making GPUBreach a more potent threat.&rdquo;<\/p>\n<div style=\"text-align:center\">\n<figure style=\"display:inline-block\"><img loading=\"lazy\" decoding=\"async\" height=\"405\" src=\"https:\/\/www.bleepingcomputer.com\/news\/security\/new-gpubreach-attack-enables-system-takeover-via-gpu-rowhammer\/data:image\/gif;base64,R0lGODlhAQABAAAAACH5BAEKAAEALAAAAAABAAEAAAICTAEAOw==\" width=\"664\" data-src=\"https:\/\/www.bleepstatic.com\/images\/news\/u\/1220909\/2026\/April\/overview.jpg\" alt=\"New GPUBreach attack enables system takeover via GPU rowhammer\"><figcaption><strong>Overview of how GPUBreach works<\/strong><br \/><em>Source: University of Toronto<\/em><\/figcaption><\/figure>\n<\/div>\n<p>The same researchers&nbsp;previously <a href=\"https:\/\/www.bleepingcomputer.com\/news\/security\/nvidia-shares-guidance-to-defend-gddr6-gpus-against-rowhammer-attacks\/\" target=\"_blank\" rel=\"nofollow noopener\">demonstrated GPUHammer<\/a>, the first attack showing that Rowhammer attacks on GPUs are practical, prompting NVIDIA to issue a warning to users and&nbsp;suggesting the activation of the System Level Error-Correcting Code mitigation to block such attempts on GDDR6 memory.<\/p>\n<p>However, GPUBreach is taking the threat to the next level, showing that it is possible not only to corrupt data but also to gain root privileges with IOMMU enabled.<\/p>\n<p>The researchers exemplified the results with an NVIDIA RTX A6000 GPU with GDDR6. This model is widely used in AI development and training workloads.<\/p>\n<div style=\"text-align:center\">\n<figure style=\"display:inline-block\"><img loading=\"lazy\" decoding=\"async\" height=\"366\" src=\"https:\/\/www.bleepingcomputer.com\/news\/security\/new-gpubreach-attack-enables-system-takeover-via-gpu-rowhammer\/data:image\/gif;base64,R0lGODlhAQABAAAAACH5BAEKAAEALAAAAAABAAEAAAICTAEAOw==\" width=\"661\" data-src=\"https:\/\/www.bleepstatic.com\/images\/news\/u\/1220909\/2026\/April\/compare.jpg\" alt=\"New GPUBreach attack enables system takeover via GPU rowhammer\"><figcaption><strong>Comparison to other GPU attacks<\/strong><br \/><em>Source: University of Toronto<\/em><\/figcaption><\/figure>\n<\/div>\n<h3>Disclosure and mitigations<\/h3>\n<p>The University of Toronto researchers reported their findings to NVIDIA, Google, AWS, and Microsoft&nbsp;on November 11, 2025.<\/p>\n<p>Google acknowledged the report and awarded the researchers a $600 bug bounty.<\/p>\n<p>NVIDIA stated that it may update its existing <a href=\"https:\/\/nvidia.custhelp.com\/app\/answers\/detail\/a_id\/5671\" target=\"_blank\" rel=\"nofollow noopener\">security notice from July 2025<\/a> to include the newly discovered attack possibilities.<\/p>\n<p>As demonstrated by the researchers, IOMMU alone is insufficient if GPU-controlled memory can corrupt trusted driver state, so users at risk should rely solely on that security measure.<\/p>\n<p>Error Correcting Code (ECC) memory helps correct single-bit flips and detect double-bit flips, but it is not reliable against multi-bit flips.<\/p>\n<p>Ultimately, the researchers underlined that GPUBreach is completely unmitigated for consumer GPUs without ECC.<\/p>\n<p>The researchers will publish the full details of their work, including a <a href=\"https:\/\/gururaj-s.github.io\/assets\/pdf\/SP26_GPUBreach.pdf\" target=\"_blank\" rel=\"nofollow noopener\">technical paper<\/a> and a <a href=\"https:\/\/github.com\/sith-lab\/gpubreach\" target=\"_blank\" rel=\"nofollow noopener\">GitHub repository<\/a> with the reproduction package and scripts, on April 13.<\/p>\n<style> .ia_ad {     background-color: #f0f6ff;     width: 95%;     max-width: 800px;     margin: 15px auto;     border-radius: 8px;     border: 1px solid #d6ddee;     display: flex;     align-items: stretch;     padding: 0;     overflow: hidden; }  .ia_lef {     flex: 1;     max-width: 200px;     height: auto;     display: flex;     align-items: stretch; }  .ia_lef a {     display: flex;     width: 100%;     height: 100%; }   .ia_lef a img {     width: 100%;     height: 100%;          border-radius: 8px 0 0 8px;     margin: 0;     display: block; }  .ia_rig {     flex: 2;     padding: 10px;     display: flex;     flex-direction: column;     justify-content: center; }  .ia_rig h2 {     font-size: 17px !important;     font-weight: 700;     color: #333;     line-height: 1.4;     font-family: Georgia, \"Times New Roman\", Times, serif;     margin: 0 0 14px 0; }  .ia_rig p {     font-weight: bold;     font-size: 14px;     margin: 0 0 clamp(6px, 2vw, 14px) 0; }  .ia_button {     background-color: #FFF;     border: 1px solid #3b59aa;     color: black;     text-align: center;     text-decoration: none;     border-radius: 8px;     display: inline-block;     font-size: 16px;     font-weight: bold;     cursor: pointer;     padding: 10px 20px;     width: fit-content; }  .ia_button a {     text-decoration: none;     color: inherit;     display: block; }  @media (max-width: 600px) {     .ia_ad {         flex-direction: column;         align-items: center;     }      .ia_lef {         max-width: 100%;     }      .ia_lef a img {         border-radius: 8px 8px 0 0;     }       .ia_rig {         padding: 15px;         width: 100%;     }      .ia_button {         width: 100%; \tmargin: 0px auto;     } } <\/style>\n<div>\n<div>         <a href=\"https:\/\/hubs.li\/Q048zztN0\" target=\"_blank\" rel=\"noopener sponsored\">             <img decoding=\"async\" src=\"https:\/\/www.bleepingcomputer.com\/news\/security\/new-gpubreach-attack-enables-system-takeover-via-gpu-rowhammer\/data:image\/gif;base64,R0lGODlhAQABAAAAACH5BAEKAAEALAAAAAABAAEAAAICTAEAOw==\" data-src=\"https:\/\/www.bleepstatic.com\/c\/p\/picus-whitepaper.jpg\" alt=\"New GPUBreach attack enables system takeover via GPU rowhammer\"><\/a>     <\/div>\n<div>\n<h2><a href=\"https:\/\/hubs.li\/Q048zztN0\" target=\"_blank\" rel=\"noopener sponsored\">Automated Pentesting Covers Only 1 of 6 Surfaces.<\/a><\/h2>\n<p>Automated pentesting proves the path exists. BAS proves whether your controls stop it. Most teams run one without the other.<\/p>\n<p>This whitepaper maps six validation surfaces, shows where coverage ends, and provides practitioners with three diagnostic questions for any tool evaluation.<\/p>\n<p>           <button><a href=\"https:\/\/hubs.li\/Q048zztN0\" target=\"_blank\" rel=\"noopener sponsored\">Get Your Copy Now<\/a><\/button>     <\/div>\n<\/p><\/div>\n<div>\n<h3>Related Articles:<\/h3>\n<p><a href=\"https:\/\/www.bleepingcomputer.com\/news\/security\/cisa-orders-feds-to-patch-fortinet-flaw-exploited-in-attacks-by-friday\/\">CISA orders feds to patch exploited Fortinet EMS flaw by Friday<\/a><\/p>\n<p><a href=\"https:\/\/www.bleepingcomputer.com\/news\/security\/gigabyte-control-center-vulnerable-to-arbitrary-file-write-flaw\/\">GIGABYTE Control Center vulnerable to arbitrary file write flaw<\/a><\/p>\n<p><a href=\"https:\/\/www.bleepingcomputer.com\/news\/security\/ubiquiti-warns-of-unifi-flaw-that-may-enable-account-takeover\/\">Max severity Ubiquiti UniFi flaw may allow account takeover<\/a><\/p>\n<p><a href=\"https:\/\/www.bleepingcomputer.com\/news\/security\/fcc-bans-new-routers-made-outside-the-usa-over-security-risks\/\">FCC bans new routers made outside the USA over security risks<\/a><\/p>\n<p><a href=\"https:\/\/www.bleepingcomputer.com\/news\/security\/connectwise-patches-new-flaw-allowing-screenconnect-hijacking\/\">ConnectWise patches new flaw allowing ScreenConnect hijacking<\/a><\/p>\n<\/p><\/div>\n","protected":false},"excerpt":{"rendered":"<p>A new attack, dubbed GPUBreach, can induce Rowhammer bi [&hellip;]<\/p>\n","protected":false},"author":1,"featured_media":0,"comment_status":"","ping_status":"","sticky":false,"template":"","format":"standard","meta":{"footnotes":""},"categories":[28],"tags":[],"class_list":["post-45166","post","type-post","status-publish","format-standard","hentry","category--bleepingcomputer"],"_links":{"self":[{"href":"https:\/\/nuoya.nuoyayasuo.top\/index.php\/wp-json\/wp\/v2\/posts\/45166","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/nuoya.nuoyayasuo.top\/index.php\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/nuoya.nuoyayasuo.top\/index.php\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/nuoya.nuoyayasuo.top\/index.php\/wp-json\/wp\/v2\/users\/1"}],"replies":[{"embeddable":true,"href":"https:\/\/nuoya.nuoyayasuo.top\/index.php\/wp-json\/wp\/v2\/comments?post=45166"}],"version-history":[{"count":0,"href":"https:\/\/nuoya.nuoyayasuo.top\/index.php\/wp-json\/wp\/v2\/posts\/45166\/revisions"}],"wp:attachment":[{"href":"https:\/\/nuoya.nuoyayasuo.top\/index.php\/wp-json\/wp\/v2\/media?parent=45166"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/nuoya.nuoyayasuo.top\/index.php\/wp-json\/wp\/v2\/categories?post=45166"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/nuoya.nuoyayasuo.top\/index.php\/wp-json\/wp\/v2\/tags?post=45166"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}