Security Researchers Demo New Rowhammer Exploit That Cracks Modern System RAM And Steals Data

samsung ddr4
Remember the RowHammer memory attack from many moons ago?? Well, it's back in a new form despite numerous mitigations that memory manufacturers have put in place to prevent this style of attack. 

A group of researchers from ETH Zurich and Vrije University in Amsterdam indicate that the series of Target Row Refresh (TRR) mitigations that were put in place after Rowhammer was first discovered have been bypassed. With RowHammer, an attack is perpetrated by "hammering" away at a single "row" of memory cells in a module until a bit-flip occurs in an adjacent row. This can cause the value of the data in the bits to change from 1 to 0 (or 0 to 1), leading to memory corruption or even denial of service attacks on a target system.

Although we don't know all of the specifics of what mitigations procedures are implemented in TRR -- other than that it is actually a collection of different security solutions rather than a solitary fix -- the researchers say that have built a "scalable blackbox RowHammer fuzzier" that they call TRRespass to carry RowHammer-style attacks. 

"TRRespass shows that even the latest generation DDR4 systems with in-DRAM TRR, immune to all known RowHammer attacks, are often still vulnerable to new TRR-aware variants of RowHammer that we develop," writes the research team. "In particular, TRRespass finds that, on present-day DDR4 modules, RowHammer is still possible when many aggressor rows are used (even 19 in some cases), in a configuration we generally refer to as Many-sided RowHammer."

The team says that it tested 43 contemporary DIMM modules to see if they were susceptible to TRRespass; 13 DIMMs could be compromised using the attack. Those vulnerable DIMMs were produced by Samsung, Hynix, and Micron, which produce the vast majority of memory chips used in DIMMs available for today's consumer and enterprise systems. Despite the fact that over two dozen modules were unfazed by the testing, the researchers caution "This does not mean that they are safe. [Finding] the right hammering pattern could be just a matter of time for our fuzzer or we may need additional parameters to improve the fuzzing strategy."

pixel 3 body

But the researchers didn't stop there; they also decided to use their TRRespass tool on LPDDR4X memory modules installed in 13 popular smartphones. Of the 13 phones tested, 5 -- including the Google Pixel 3, LG G7 ThinQ, and OnePlus 7 -- fell victim to the TRRespass tool.

The results of the new TRRespass testing were revealed to hardware makers in November 2019 (CVE2020-10255), however, these are security exploits that are present at the hardware level. That means that we won't likely see "fully patched" modules until vendor can implement design changes at the hardware-level in future production.

Brandon Hill

Brandon Hill

Brandon received his first PC, an IBM Aptiva 310, in 1994 and hasn’t looked back since. He cut his teeth on computer building/repair working at a mom and pop computer shop as a plucky teen in the mid 90s and went on to join AnandTech as the Senior News Editor in 1999. Brandon would later help to form DailyTech where he served as Editor-in-Chief from 2008 until 2014. Brandon is a tech geek at heart, and family members always know where to turn when they need free tech support. When he isn’t writing about the tech hardware or studying up on the latest in mobile gadgets, you’ll find him browsing forums that cater to his long-running passion: automobiles.

Opinions and content posted by HotHardware contributors are their own.