Загрузка...

Rowhammer attack threatens NVIDIA Ampere GPUs and host systems.

Researchers have demonstrated a Rowhammer-style technique that flips bits in GDDR on NVIDIA Ampere GPUs to corrupt CPU memory via DMA, enabling full host compromise when IOMMU is disabled. Independent teams reproduced the attack on two Ampere cards. The approach targets host systems that pair these GPUs with default BIOS settings where IOMMU is off, broadening exposure even without a kernel or driver bug. There are no CVEs and no evidence of in-the-wild exploitation. This is a follow-up to earlier reporting on the same developing issue. Inventory Ampere GPUs, verify and enable IOMMU in BIOS/UEFI, restrict untrusted GPU workloads, and validate BIOS defaults across fleets—especially in manufacturing and other GPU-accelerated environments. Read the full daily briefing: https://kernelpanicbrief.substack.com Get the full daily cybersecurity newsletter for the bigger picture. Related links: Daily newsletter: https://kernelpanicbrief.substack.com Recommended tools and reading: Disclosure: This section contains paid affiliate links. We may earn a commission if you purchase through these links. Sophos (Affiliate Link): https://prf.hn/l/ojNAEE2/ #cybersecurity #infosec #shorts #vulnerability

Видео Rowhammer attack threatens NVIDIA Ampere GPUs and host systems. канала The Kernel Panic Brief
Яндекс.Метрика
Все заметки Новая заметка Страницу в заметки
Страницу в закладки Мои закладки
На информационно-развлекательном портале SALDA.WS применяются cookie-файлы. Нажимая кнопку Принять, вы подтверждаете свое согласие на их использование.
О CookiesНапомнить позжеПринять