Casino88

7 Critical Insights into the Rowhammer Attacks on NVIDIA GPUs

New Rowhammer attacks on NVIDIA GPUs (GDDRHammer, GeForge) allow full system compromise via bitflips, even bypassing IOMMU in one case.

Casino88 · 2026-05-07 13:00:01 · Hardware

Recent research has unveiled a new class of cyber threats targeting NVIDIA GPUs from the Ampere generation. Two independent teams have demonstrated that the classic Rowhammer attack—previously a CPU-specific vulnerability—can now be weaponized against graphics processing units. These attacks, named GDDRHammer and GeForge, exploit GPU memory to flip bits in DRAM rows, ultimately granting adversaries full control over the host CPU's memory and enabling complete system compromise. A third attack even bypasses the IOMMU protection, making these threats alarmingly potent. This listicle breaks down the key findings and implications of these groundbreaking exploits.

1. What Is Rowhammer and Why It Matters for GPUs

Rowhammer is a hardware vulnerability that occurs when repeated accesses to a specific row of DRAM cells cause electrical interference, leading to bit flips in adjacent rows. Traditionally, this was a concern for CPUs, but recent research shows GPUs are equally susceptible. Modern GPUs use GDDR memory, which is dense and prone to such disturbances. An attacker can trigger these bit flips to corrupt sensitive data, such as page table entries, gaining unauthorized access. The attacks on NVIDIA Ampere GPUs prove that Rowhammer is no longer limited to CPUs—it's a serious threat to graphics hardware and the systems they support.

7 Critical Insights into the Rowhammer Attacks on NVIDIA GPUs
Source: www.schneier.com

2. Two Independent Teams, Two Powerful Attacks

On the same day, two research groups unveiled separate exploits targeting NVIDIA's Ampere generation: GDDRHammer and GeForge. Both attacks demonstrate that an adversary can induce bit flips in GDDR6 memory to hijack GPU page tables. From there, they escalate privileges to read and write the host CPU's memory, achieving full system compromise. The attacks require the IOMMU (Input-Output Memory Management Unit) to be disabled, which is often the default in BIOS settings. However, as we'll see, a third attack later showed that even IOMMU alone may not be sufficient protection.

3. GDDRHammer: Gaining Arbitrary Read/Write Access to CPU Memory

GDDRHammer, detailed in the paper "GDDRHammer: Greatly Disturbing DRAM Rows—Cross-Component Rowhammer Attacks from Modern GPUs," exploits the last-level GPU page table. By hammering memory rows in the GPU's GDDR6, researchers achieved bit flips that corrupted page table entries. This gave them arbitrary read/write access to all of the CPU's memory, effectively taking over the host machine. Co-author Andrew Kwong emphasized that Rowhammer is now a serious threat on GPUs. Notably, the attack works because the IOMMU is disabled by default, which allowed the GPU to access CPU memory directly.

4. GeForge: Forging GPU Page Tables for a Root Shell

The GeForge attack (from the paper "GeForge: Hammering GDDR Memory to Forge GPU Page Tables for Fun and Profit") takes a slightly different approach. Instead of targeting the last-level page table, it manipulates the last-level page directory. This allowed the researchers to induce 1,171 bitflips against the RTX 3060 and 202 bitflips against the RTX 6000. The proof-of-concept exploit on the RTX 3060 culminates in spawning a root shell, granting the attacker unrestricted commands on the host. Both GDDRHammer and GeForge were shown to work against the RTX 6000 as well, highlighting the widespread vulnerability among Ampere GPUs.

5. The Third Attack: Bypassing IOMMU Protection

Just a day later, a third research team published a Rowhammer attack specifically targeting the NVIDIA RTX A6000. This attack diverges from the first two because it successfully achieves privilege escalation to a root shell even when the IOMMU is enabled. The IOMMU is a hardware feature designed to prevent unauthorized memory access from peripheral devices like GPUs. However, this new exploit circumvents that safeguard, making it even more dangerous. It underscores that relying solely on enabling IOMMU may not be sufficient to protect against GPU-based Rowhammer attacks, prompting urgent calls for hardware-level mitigations.

7 Critical Insights into the Rowhammer Attacks on NVIDIA GPUs
Source: www.schneier.com

6. Why These Attacks Are So Dangerous

The ability to achieve full system compromise via a GPU is a game changer. GPUs are ubiquitous in desktops, servers, and even cloud environments, often processing sensitive data like encryption keys and neural network models. A successful Rowhammer attack can leak or corrupt this data, leading to catastrophic breaches. Moreover, the default BIOS setting (IOMMU disabled) on many systems means that a significant number of machines are vulnerable out of the box. Even when IOMMU is enabled, the third attack shows that determined attackers can still break through. This elevates GPU Rowhammer from a theoretical curiosity to a practical, urgent security threat.

7. Mitigation Strategies and the Road Ahead

Current mitigation options are limited. Enabling IOMMU is a first step, but as demonstrated, it's not foolproof. Hardware manufacturers like NVIDIA may need to implement new memory controllers that are resistant to Rowhammer or increase refresh rates for GDDR memory. Software defenses, such as memory integrity checks and aggressive memory scrubbing, can help but may impact performance. Users can also check their BIOS settings to ensure IOMMU is enabled if supported. However, until hardware revisions are available, these attacks remain a serious concern. The research community continues to explore both offensive and defensive techniques, and stay tuned for firmware updates from GPU vendors.

Conclusion

The Rowhammer attacks on NVIDIA Ampere GPUs mark a pivotal shift in the landscape of hardware security. By demonstrating that GPU memory can be exploited to hijack the host CPU, GDDRHammer, GeForge, and the RTX A6000 attack indicate that graphics processors are no longer just innocent bystanders in system compromises. Users and administrators must take note: default settings may leave them exposed, and even advanced protections like IOMMU can be bypassed. As hardware vendors race to implement countermeasures, the onus is on everyone to stay informed and apply available mitigations. The era of GPU-assisted attacks has truly begun.

Recommended