Skip to content
Tech News
← Back to articles

New Rowhammer attacks give complete control of machines running Nvidia GPUs

read original get Nvidia GPU Overclocking Kit → more articles
Why This Matters

Recent Rowhammer attacks on Nvidia GPUs reveal critical vulnerabilities that can allow malicious users to gain full control of host machines, especially in cloud environments where high-performance GPUs are shared among many users. These exploits highlight the growing security risks associated with hardware memory vulnerabilities in modern GPUs, which could have significant implications for data security and system integrity in the tech industry. As GPU hardware becomes more integral to AI and cloud computing, addressing these vulnerabilities is crucial for safeguarding sensitive data and maintaining trust in cloud services.

Key Takeaways

Given the cost and shortage of high-performance GPUs driven by AI, these cards, typically costing $8,000 or more, are frequently shared among dozens of users in cloud environments. Two new attacks demonstrate how a malicious user can gain full root control of the host machine by performing novel Rowhammer attacks on high-performance GPU cards made by Nvidia.

The attacks exploit memory hardware’s increasing susceptibility to bit flips, in which 0s stored in memory switch to 1s and vice versa. In 2014, researchers first demonstrated that repeated, rapid access—or “hammering”—of memory hardware known as DRAM creates electrical disturbances that flip bits. A year later, a different research team showed that by targeting specific DRAM rows storing sensitive data, an attacker could exploit the phenomenon to escalate an unprivileged user to root or evade security sandbox protections. Both attacks targeted DDR3 generations of DRAM.

From CPU to GPU: Rowhammer’s decade-long journey

Over the past decade, dozens of newer Rowhammer attacks have evolved to, among other things:

The last feat proved that GDDR was susceptible to Rowhammer attacks, but the results were modest. The researchers achieved only eight bitflips, a small fraction of what has been possible on CPU DRAM, and the damage was limited to degrading the output of a neural network running on the targeted GPU.