{"id":45188,"date":"2026-04-07T22:54:51","date_gmt":"2026-04-07T14:54:51","guid":{"rendered":"https:\/\/nuoya.nuoyayasuo.top\/index.php\/2026\/04\/07\/new-gpubreach-attack-enables-full-cpu-privilege-escalation-via-gddr6-bit-flips\/"},"modified":"2026-04-07T22:54:51","modified_gmt":"2026-04-07T14:54:51","slug":"new-gpubreach-attack-enables-full-cpu-privilege-escalation-via-gddr6-bit-flips","status":"publish","type":"post","link":"https:\/\/nuoya.nuoyayasuo.top\/index.php\/2026\/04\/07\/new-gpubreach-attack-enables-full-cpu-privilege-escalation-via-gddr6-bit-flips\/","title":{"rendered":"New GPUBreach Attack Enables Full CPU Privilege Escalation via GDDR6 Bit-Flips"},"content":{"rendered":"<div style=\"clear: both;\"><a href=\"https:\/\/blogger.googleusercontent.com\/img\/b\/R29vZ2xl\/AVvXsEjD7E4oEicfW1OaHztWEuM4qrsJFnHRPJ41f8R-2VeKUFV3Y59XaBUctumc2R91miQ3dMPnwkEcpPMqFErKmPRJhS3VRceve1GOSGGUsP6WHGIfoQAuVV10JVy312CxGYvmb2xA_eQtuO69bNb-1NzYln9P4xbsFDoPgWG3BEdri4sRRj415XQr1NENZBh0\/s1600\/grpu.jpg\" style=\"display: block; padding: 1em 0; text-align: center; clear: left; float: left;\"><img decoding=\"async\" border=\"0\" data-original-height=\"470\" data-original-width=\"900\" src=\"https:\/\/blogger.googleusercontent.com\/img\/b\/R29vZ2xl\/AVvXsEjD7E4oEicfW1OaHztWEuM4qrsJFnHRPJ41f8R-2VeKUFV3Y59XaBUctumc2R91miQ3dMPnwkEcpPMqFErKmPRJhS3VRceve1GOSGGUsP6WHGIfoQAuVV10JVy312CxGYvmb2xA_eQtuO69bNb-1NzYln9P4xbsFDoPgWG3BEdri4sRRj415XQr1NENZBh0\/s1600\/grpu.jpg\" alt=\"New GPUBreach Attack Enables Full CPU Privilege Escalation via GDDR6 Bit-Flips\"\/><\/a><\/div>\n<p>New academic research has identified multiple RowHammer attacks against high-performance graphics processing units (GPUs) that could be exploited to escalate privileges and, in some cases, even take full control of a&nbsp;host.<\/p>\n<p>The efforts have been&nbsp;codenamed <strong><a href=\"https:\/\/gpubreach.ca\/\">GPUBreach<\/a><\/strong>, <strong><a href=\"https:\/\/gddr.fail\/\">GDDRHammer<\/a><\/strong><a href=\"https:\/\/gddr.fail\/\">,&nbsp;and <\/a><strong><a href=\"https:\/\/gddr.fail\/\">GeForge<\/a><\/strong>.<\/p>\n<p>GPUBreach goes a step further&nbsp;than <a href=\"https:\/\/thehackernews.com\/2025\/07\/gpuhammer-new-rowhammer-attack-variant.html\">GPUHammer<\/a>, demonstrating for the first time that RowHammer bit-flips in GPU memory can induce much more than data corruption and enable privilege escalation, and lead to a full system compromise.<\/p>\n<p>&#8220;By corrupting GPU page tables via GDDR6 bit-flips, an unprivileged process can gain arbitrary GPU memory read\/write, and then chain that into full CPU privilege escalation &#8212; spawning a root shell &#8212; by exploiting memory-safety bugs in the NVIDIA driver,&#8221; Gururaj Saileshwar, one of the authors of the study and Assistant Professor at the University of&nbsp;Toronto, <a href=\"https:\/\/www.linkedin.com\/posts\/gururaj-saileshwar-080a4526_gpubreach-activity-7445871096840712193-FSM5\/\">said<\/a> in a post on&nbsp;LinkedIn.<\/p>\n<p>What makes GPUBreach notable is that it works even without having to disable the input&#8211;output memory management unit&nbsp;(<a href=\"https:\/\/link.springer.com\/article\/10.1186\/s13173-017-0066-7\">IOMMU<\/a>),&nbsp;a <a href=\"https:\/\/thehackernews.com\/2025\/12\/new-uefi-flaw-enables-early-boot-dma.html\">crucial hardware&nbsp;component<\/a> that ensures memory security by preventing Direct Memory Access (DMA) attacks and isolating each peripheral to its own memory&nbsp;space.<\/p>\n<p> <a name=\"more\"><\/a> <\/p>\n<p>&#8220;GPUBreach shows it is not enough: by corrupting trusted driver state within IOMMU-permitted buffers, we trigger kernel-level out-of-bounds writes &#8212; bypassing IOMMU protections entirely without needing it disabled,&#8221; Saileshwar added. &#8220;This has serious implications for cloud AI infrastructure, multi-tenant GPU deployments, and HPC environments.&#8221;<\/p>\n<p>RowHammer is a long-standing Dynamic Random-Access Memory (DRAM) reliability error where repeated accesses (i.e., hammering) to a memory row can cause electrical interference that flips bits (changing 0 to 1m or vice versa) in adjacent rows. This&nbsp;undermines isolation guarantees fundamental to modern operating systems and sandboxes.<\/p>\n<p>DRAM manufacturers have implemented hardware-level mitigations, such as Error-Correcting Code (ECC) and Target Row Refresh (TRR), to counter this line of&nbsp;attack.&nbsp;<\/p>\n<p>However, research published in July 2025 by researchers at the University of Toronto expanded the threat to&nbsp;GPUs. <a href=\"https:\/\/thehackernews.com\/2025\/07\/gpuhammer-new-rowhammer-attack-variant.html\">GPUHammer<\/a>, as it&#8217;s called, is the first practical RowHammer attack targeting NVIDIA GPUs using GDDR6 memory. It&nbsp;employs techniques like multi-threaded parallel hammering to overcome architectural challenges inherent to GPUs that previously made them immune to bit&nbsp;flips.<\/p>\n<p>The consequence of a successful GPUHammer exploit is a drop in machine learning (ML) model accuracy, which can degrade by up to 80% when running on a&nbsp;GPU.<\/p>\n<p>GPUBreach extends this approach to corrupt GPU page tables with RowHammer and achieve privilege escalation, resulting in arbitrary read\/write on GPU memory. More&nbsp;consequentially, the attack has been found to leak secret cryptographic keys&nbsp;from <a href=\"https:\/\/developer.nvidia.com\/cupqc\">NVIDIA&nbsp;cuPQC<\/a>, stage model accuracy degradation attacks, and obtain CPU privilege escalation with IOMMU&nbsp;enabled.<\/p>\n<p>&#8220;The compromised GPU issues DMA (using the aperture bits in PTEs) into a region of CPU memory that the IOMMU permits (the GPU driver&#8217;s own buffers),&#8221; the researchers said. &#8220;By corrupting this trusted driver state, the attack triggers memory-safety bugs in the NVIDIA kernel driver and gains an arbitrary kernel write primitive, which is then used to spawn a root&nbsp;shell.&#8221;<\/p>\n<p>This disclosure of GPUBreach coincides with two other concurrent works &#8211; GDDRHammer and GeForge &#8211; that also revolve around GPU page-table corruption via GDDR6 RowHammer and facilitate GPU-side privilege escalation. Just&nbsp;like GPUBreach, both techniques can be used to gain arbitrary read\/write access to CPU&nbsp;Memory.<\/p>\n<p>Where GPUBreach stands apart is that it also enables full CPU privilege escalation, making it a more potent attack. GeForge, in particular, requires IOMMU to be disabled for it to work, whereas GDDRHammer modifies the GPU page table entry&#8217;s aperture field to allow the unprivileged <a href=\"https:\/\/developer.nvidia.com\/blog\/even-easier-introduction-cuda\/\">CUDA<\/a> kernel to read and write all of the host CPU&#8217;s&nbsp;memory.<\/p>\n<p>&#8220;One main difference is that GDDRHammer exploits the last level page table (PT) and GeForge exploits the last level page directory (PD0),&#8221; the teams behind the two GPU memory exploits said. &#8220;However, both&nbsp;works are able&nbsp;to achieve the same goal of hijacking the GPU page table translation to gain read\/write access to the GPU and host&nbsp;memory.&#8221;<\/p>\n<p>One temporary mitigation to tackle these attacks is&nbsp;to <a href=\"https:\/\/nvidia.custhelp.com\/app\/answers\/detail\/a_id\/5671\">enable&nbsp;ECC<\/a> on the GPU. That&nbsp;said, it bears noting that RowHammer attacks&nbsp;like <a href=\"https:\/\/thehackernews.com\/2021\/04\/new-javascript-exploit-can-now-carry.html\">ECCploit<\/a>&nbsp;and <a href=\"https:\/\/thehackernews.com\/2025\/09\/phoenix-rowhammer-attack-bypasses.html\">ECC.fail<\/a> have been found to overcome this countermeasure.<\/p>\n<p>&#8220;However, if attack patterns induce more than two bit flips (shown feasible on DDR4 and DDR5 systems), existing ECC cannot correct these and may even cause silent data corruption; so ECC is not a foolproof mitigation against GPUBreach,&#8221; the researchers said. &#8220;On desktop or laptop GPUs, where ECC is currently unavailable, there are no known mitigations to our knowledge.&#8221;<\/p>\n<div><\/div>\n<div>Found this article interesting?  Follow us on <a href='https:\/\/news.google.com\/publications\/CAAqLQgKIidDQklTRndnTWFoTUtFWFJvWldoaFkydGxjbTVsZDNNdVkyOXRLQUFQAQ' rel='noopener' target='_blank'>Google News<\/a>, <a href='https:\/\/twitter.com\/thehackersnews' rel='noopener' target='_blank'>Twitter<\/a> and <a href='https:\/\/www.linkedin.com\/company\/thehackernews\/' rel='noopener' target='_blank'>LinkedIn<\/a> to read more exclusive content we post.<\/div>\n","protected":false},"excerpt":{"rendered":"<p>New academic research has identified multiple RowHammer attacks against high-performance graphics processing units (GPUs) that could be exploited to escalate privileges and, in some cases, even take full control of a&nbsp;host.<\/p>\n","protected":false},"author":1,"featured_media":0,"comment_status":"","ping_status":"","sticky":false,"template":"","format":"standard","meta":{"footnotes":""},"categories":[6],"tags":[],"class_list":["post-45188","post","type-post","status-publish","format-standard","hentry","category-thehackernews"],"_links":{"self":[{"href":"https:\/\/nuoya.nuoyayasuo.top\/index.php\/wp-json\/wp\/v2\/posts\/45188","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/nuoya.nuoyayasuo.top\/index.php\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/nuoya.nuoyayasuo.top\/index.php\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/nuoya.nuoyayasuo.top\/index.php\/wp-json\/wp\/v2\/users\/1"}],"replies":[{"embeddable":true,"href":"https:\/\/nuoya.nuoyayasuo.top\/index.php\/wp-json\/wp\/v2\/comments?post=45188"}],"version-history":[{"count":0,"href":"https:\/\/nuoya.nuoyayasuo.top\/index.php\/wp-json\/wp\/v2\/posts\/45188\/revisions"}],"wp:attachment":[{"href":"https:\/\/nuoya.nuoyayasuo.top\/index.php\/wp-json\/wp\/v2\/media?parent=45188"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/nuoya.nuoyayasuo.top\/index.php\/wp-json\/wp\/v2\/categories?post=45188"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/nuoya.nuoyayasuo.top\/index.php\/wp-json\/wp\/v2\/tags?post=45188"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}