OPEN_SOURCE ↗
HN · HACKER_NEWS// 8d agoSECURITY INCIDENT
GPU Rowhammer attacks root Nvidia machines
Researchers behind two new attacks, GDDRHammer and GeForge, showed that Rowhammer-style bit flips in GDDR6 GPU memory can break Nvidia GPU isolation and escalate to full host compromise. The work, disclosed at gddr.fail and covered by Ars Technica, demonstrates root shell access on vulnerable systems, with impact centered on specific Ampere-era Nvidia cards and configurations where protections like IOMMU and ECC are not enabled.
// ANALYSIS
This is serious security research with real-world bite, not just a lab curiosity.
- –The core takeaway is escalation, not just corruption: the attacks can pivot from GPU memory faults to host CPU memory access and root control.
- –The demonstrated scope appears narrower than the headline implies, centered on tested GDDR6-based Nvidia Ampere cards such as RTX 3060 and RTX A6000-class systems.
- –The practical risk is highest in shared, multi-tenant, or GPU-as-a-service environments where attacker code can run unprivileged on the same machine.
- –Mitigations exist, but they are tradeoffs: ECC can reduce usable memory/perf, and IOMMU has compatibility/performance implications.
- –For most consumers this is not an everyday desktop exploit story; for infrastructure operators, it is a hardware trust-boundary problem that needs review now.
// TAGS
nvidiagpurowhammergddr6cybersecurityprivilege-escalationroot-shellresearch
DISCOVERED
8d ago
2026-04-03
PUBLISHED
9d ago
2026-04-03
RELEVANCE
10/ 10
AUTHOR
01-_-