New GPUBreach Attack Escalates CPU Privileges Through GDDR6 Bit-Flips

Published:

spot_img

New GPUBreach Attack Escalates CPU Privileges Through GDDR6 Bit-Flips

Recent academic research has unveiled a series of RowHammer attacks targeting high-performance graphics processing units (GPUs), revealing vulnerabilities that could allow attackers to escalate privileges and potentially gain full control over host systems. The research, which has been codenamed GPUBreach, alongside GDDRHammer and GeForge, marks a significant advancement in the exploitation of GPU architectures.

The Evolution of RowHammer Attacks

GPUBreach represents a notable evolution from previous exploits, particularly GPUHammer, which was the first practical RowHammer attack aimed at NVIDIA GPUs utilizing GDDR6 memory. This new research demonstrates that RowHammer bit-flips in GPU memory can lead to more than just data corruption; they can facilitate privilege escalation and full system compromise.

Gururaj Saileshwar, an Assistant Professor at the University of Toronto and one of the study’s authors, explained that by corrupting GPU page tables through GDDR6 bit-flips, an unprivileged process can gain arbitrary read and write access to GPU memory. This access can then be leveraged to escalate privileges on the CPU, ultimately allowing the attacker to spawn a root shell by exploiting memory-safety vulnerabilities in the NVIDIA driver.

Implications for Memory Management Security

What sets GPUBreach apart is its ability to function without disabling the Input-Output Memory Management Unit (IOMMU). The IOMMU is a critical hardware component designed to enhance memory security by preventing Direct Memory Access (DMA) attacks and isolating each peripheral to its own memory space. Saileshwar noted that GPUBreach bypasses IOMMU protections entirely by corrupting trusted driver states within IOMMU-permitted buffers, triggering kernel-level out-of-bounds writes.

This capability poses serious implications for cloud AI infrastructure, multi-tenant GPU deployments, and high-performance computing (HPC) environments. The research indicates that existing protections may not be sufficient to mitigate these advanced threats.

Understanding RowHammer and Its Impact

RowHammer is a well-known reliability issue in Dynamic Random-Access Memory (DRAM), where repeated access to a memory row can cause electrical interference, flipping bits in adjacent rows. This phenomenon undermines the isolation guarantees that are fundamental to modern operating systems and sandboxing techniques.

To counteract such vulnerabilities, DRAM manufacturers have implemented hardware-level mitigations, including Error-Correcting Code (ECC) and Target Row Refresh (TRR). However, the recent findings highlight that these measures may not be adequate against sophisticated RowHammer attacks targeting GPUs.

The Broader Context of GPU Vulnerabilities

The research published in July 2025 expanded the threat landscape to GPUs, with GPUHammer being the first practical RowHammer attack aimed at NVIDIA GPUs using GDDR6 memory. It employs techniques such as multi-threaded parallel hammering to overcome architectural challenges that previously rendered GPUs resistant to bit flips. A successful GPUHammer exploit can lead to a significant drop in machine learning model accuracy, with degradation rates reaching up to 80% when operating on a GPU.

GPUBreach builds on this foundation, allowing for the corruption of GPU page tables and resulting in arbitrary read/write access to GPU memory. More alarmingly, the attack has been shown to leak secret cryptographic keys from NVIDIA’s cuPQC, degrade model accuracy, and achieve CPU privilege escalation even with IOMMU enabled.

Distinctions Among the New Attacks

The disclosure of GPUBreach coincides with the emergence of GDDRHammer and GeForge, both of which also exploit GPU page-table corruption via GDDR6 RowHammer to facilitate GPU-side privilege escalation. While GPUBreach enables full CPU privilege escalation, GeForge requires the IOMMU to be disabled, and GDDRHammer modifies the GPU page table entry’s aperture field to allow unprivileged CUDA kernels to access all host CPU memory.

The teams behind these exploits have noted that GDDRHammer targets the last level page table (PT), while GeForge focuses on the last level page directory (PD0). Despite these differences, both approaches aim to hijack GPU page table translations to gain read/write access to both GPU and host memory.

Mitigation Strategies and Limitations

One temporary mitigation strategy against these attacks is to enable ECC on the GPU. However, it is important to recognize that RowHammer attacks, such as ECCploit and ECC.fail, have demonstrated the ability to bypass this countermeasure. Researchers have indicated that if attack patterns induce more than two bit flips—an occurrence feasible on DDR4 and DDR5 systems—existing ECC cannot correct these errors and may even lead to silent data corruption. Consequently, ECC is not a foolproof solution against GPUBreach.

For desktop or laptop GPUs, where ECC is currently unavailable, there are no known mitigations to address these vulnerabilities.

The implications of GPUBreach and its associated attacks are profound, highlighting the need for ongoing vigilance and innovation in cybersecurity measures to protect against emerging threats in the GPU landscape.

Source: thehackernews.com

Keep reading for the latest cybersecurity developments, threat intelligence and breaking updates from across the Middle East.

spot_img

Related articles

Recent articles

Rethinking DLP: Strengthening Data Protection Beyond Traditional Leak Prevention

Rethinking DLP: Strengthening Data Protection Beyond Traditional Leak Prevention In an era where data breaches and insider threats are increasingly prevalent, organizations are compelled to...

HP Launches TPM Guard to Strengthen Protection Against Physical TPM Bus Attacks

HP Launches TPM Guard to Strengthen Protection Against Physical TPM Bus Attacks HP has introduced HP TPM Guard, a groundbreaking hardware solution designed to thwart...

Germany Identifies “UNKN,” Leader of Russian Ransomware Gangs REvil and GandCrab, Responsible for 130 Cyberattacks

Germany Identifies “UNKN,” Leader of Russian Ransomware Gangs REvil and GandCrab, Responsible for 130 Cyberattacks Authorities in Germany have unveiled the identity of a notorious...

World Cloud Security Day 2026: Strengthening Identity Management Amid Rising Cloud Risks

World Cloud Security Day 2026: Strengthening Identity Management Amid Rising Cloud Risks World Cloud Security Day serves as a crucial reminder for organizations to reassess...