Phoenix advisory pattern

Security Advisory — Phoenix: Rowhammer on DDR5

Advisory ID: CSA-2025-0928-PHOENIX   •   CVE: CVE-2025-6202   •   Severity: High
Published: 28 September 2025   •   Discovered by: ETH Zurich (COMSEC) & Google Security

Summary

Phoenix is a Rowhammer variant against DDR5 DRAM that bypasses on-die mitigations by exploiting timing blind spots in Target Row Refresh (TRR) and using long hammering sequences that remain synchronized with refresh commands via a self-correcting refresh synchronization mechanism. The researchers demonstrated exploitable bit flips on SK Hynix DDR5 DIMMs and end-to-end attacks including arbitrary read/write via PTE corruption, RSA key leakage, and local privilege escalation.

Technical Details

Vulnerability Class

Rowhammer (DRAM disturbance attack)

Root Cause

TRR implementations on the affected SK Hynix DDR5 modules exhibit non-uniform sampling across refresh intervals. Attackers can craft hammer patterns that target the lightly-sampled or unsampled tREFI intervals so TRR fails to refresh victim rows in time.

Key Innovations

Exploit Demonstrations

Impact

Successful exploitation can lead to privilege escalation, secret extraction (SSH keys), and cross-VM compromise in multi-tenant environments.

CVSS v3.1 (est.): 8.8 (High)

VectorValue
Attack VectorLocal
Attack ComplexityHigh
Privileges RequiredLow
User InteractionNone

Mitigations

Immediate

Long-term

Affected Hardware

15 SK Hynix DDR5 DIMMs (2021–2024) — all tested modules vulnerable to at least one pattern. ODECC does not prevent exploitation.

Detection

ETH Zurich published a PoC on GitHub for controlled testing (AMD Zen 4). Defensive signals to monitor:

Disclosure Timeline

06 Jun 2025 — Coordinated disclosure initiated
12 Sep 2025 — Vendor notified (BIOS update availability)
15 Sep 2025 — Embargo lifted
28 Sep 2025 — Advisory published

References

• ETH Zurich COMSEC Phoenix project page
• Phoenix GitHub repository (POC + artifacts)
• Google Security Blog summary
• CVE-2025-6202

Action Required

Organizations using DDR5 systems with SK Hynix DIMMs should immediately apply vendor BIOS/firmware updates and evaluate increasing DRAM refresh rates until hardware fixes or new DRAM revisions become available.

Acknowledgments: ETH Zurich Computer Security Group (COMSEC) and Google Security. Disclosure coordination: Swiss NCSC.

View PoC & Artifacts (GitHub) Project Page