Close Menu
    Facebook X (Twitter) Instagram
    Wifi PortalWifi Portal
    • Blogging
    • SEO & Digital Marketing
    • WiFi / Internet & Networking
    • Cybersecurity
    • Tech Tools & Mobile / Apps
    • Privacy & Online Earning
    Facebook X (Twitter) Instagram
    Wifi PortalWifi Portal
    Home»Cybersecurity»New GPUBreach attack enables system takeover via GPU rowhammer
    Cybersecurity

    New GPUBreach attack enables system takeover via GPU rowhammer

    adminBy adminApril 7, 2026No Comments3 Mins Read
    Facebook Twitter LinkedIn Telegram Pinterest Tumblr Reddit WhatsApp Email
    New GPUBreach attack enables system takeover via GPU rowhammer
    Share
    Facebook Twitter LinkedIn Pinterest Email

    New GPUBreach attack enables system takeover via GPU rowhammer

    A new attack, dubbed GPUBreach, can induce Rowhammer bit-flips on GPU GDDR6 memories to escalate privileges and lead to a full system compromise.

    GPUBreach was developed by a team of researchers at the University of Toronto, and full details will be presented at the upcoming IEEE Symposium on Security & Privacy on April 13 in Oakland.

    The researchers demonstrated that Rowhammer-induced bit flips in GDDR6 can corrupt GPU page tables (PTEs) and grant arbitrary GPU memory read/write access to an unprivileged CUDA kernel.

    Wiz

    An attacker may then chain this into a CPU-side escalation by exploiting memory-safety bugs in the NVIDIA driver, potentially leading to complete system compromise without the need to disable Input-Output Memory Management Unit (IOMMU) protection.

    GPUBreach attack steps
    GPUBreach attack steps
    Source: University of Toronto

    IOMMU is a hardware unit that protects against direct memory attacks. It controls and restricts how devices access memory by managing which memory regions are accessible to each device.

    Despite being an effective measure against most direct memory access (DMA) attacks, IOMMU does not stop GPUBreach.

    “GPUBreach shows that GPU Rowhammer attacks can move beyond data corruption to real privilege escalation,” the researchers explain.

    “By corrupting GPU page tables, an unprivileged CUDA kernel can gain arbitrary GPU memory read/write, and then chain that capability into CPU-side escalation by exploiting newly discovered memory-safety bugs in the NVIDIA driver.”

    “The result is system-wide compromise up to a root shell, without disabling IOMMU, unlike contemporary works, making GPUBreach a more potent threat.”

    Overview of how GPUBreach works
    Overview of how GPUBreach works
    Source: University of Toronto

    The same researchers previously demonstrated GPUHammer, the first attack showing that Rowhammer attacks on GPUs are practical, prompting NVIDIA to issue a warning to users and suggesting the activation of the System Level Error-Correcting Code mitigation to block such attempts on GDDR6 memory.

    However, GPUBreach is taking the threat to the next level, showing that it is possible not only to corrupt data but also to gain root privileges with IOMMU enabled.

    The researchers exemplified the results with an NVIDIA RTX A6000 GPU with GDDR6. This model is widely used in AI development and training workloads.

    Comparison to other attacks
    Comparison to other GPU attacks
    Source: University of Toronto

    Disclosure and mitigations

    The University of Toronto researchers reported their findings to NVIDIA, Google, AWS, and Microsoft on November 11, 2025.

    Google acknowledged the report and awarded the researchers a $600 bug bounty.

    NVIDIA stated that it may update its existing security notice from July 2025 to include the newly discovered attack possibilities.

    As demonstrated by the researchers, IOMMU alone is insufficient if GPU-controlled memory can corrupt trusted driver state, so users at risk should not rely solely on that security measure.

    Error Correcting Code (ECC) memory helps correct single-bit flips and detect double-bit flips, but it is not reliable against multi-bit flips.

    Ultimately, the researchers underlined that GPUBreach is completely unmitigated for consumer GPUs without ECC.

    The researchers will publish the full details of their work, including a technical paper and a GitHub repository with the reproduction package and scripts, on April 13.

    NVIDIA told BleepingComputer that, for enterprise customer environments, they recommend enabling System Level Error-Correcting Codes to prevent Rowhammer-style attacks. This is enabled by default on the Hopper and Blackwell Data Center class of GPUs.


    tines

    Automated pentesting proves the path exists. BAS proves whether your controls stop it. Most teams run one without the other.

    This whitepaper maps six validation surfaces, shows where coverage ends, and provides practitioners with three diagnostic questions for any tool evaluation.

    Attack enables GPU GPUBreach rowhammer System Takeover
    Share. Facebook Twitter Pinterest LinkedIn Tumblr Telegram Email
    Previous ArticleWaymo is set to launch its London pilot this month, here’s what you need to know
    Next Article I used the Vivo X300 Ultra for a week, and I can’t believe a phone camera is this good
    admin
    • Website

    Related Posts

    GitHub Copilot CLI gets a second-opinion feature built on cross-model review

    April 7, 2026

    Wynn Resorts Says 21,000 Employees Affected by ShinyHunters Hack

    April 7, 2026

    How SOCs Close a Critical Risk in 3 Steps

    April 7, 2026
    Add A Comment
    Leave A Reply Cancel Reply

    Search Blog
    About
    About

    At WifiPortal.tech, we share simple, easy-to-follow guides on cybersecurity, online privacy, and digital opportunities. Our goal is to help everyday users browse safely, protect personal data, and explore smart ways to earn online. Whether you’re new to the digital world or looking to strengthen your online knowledge, our content is here to keep you informed and secure.

    Trending Blogs

    Private Compute Services 1.0.release.895254434 APK Download by Google LLC

    April 7, 2026

    GitHub Copilot CLI gets a second-opinion feature built on cross-model review

    April 7, 2026

    Google’s Mueller On SEO Gurus Who Are “Clueless Imposters”

    April 7, 2026

    I used the Vivo X300 Ultra for a week, and I can’t believe a phone camera is this good

    April 7, 2026
    Categories
    • Blogging (56)
    • Cybersecurity (1,182)
    • Privacy & Online Earning (151)
    • SEO & Digital Marketing (713)
    • Tech Tools & Mobile / Apps (1,419)
    • WiFi / Internet & Networking (197)

    Subscribe to Updates

    Stay updated with the latest tips on cybersecurity, online privacy, and digital opportunities straight to your inbox.

    WifiPortal.tech is a blogging platform focused on cybersecurity, online privacy, and digital opportunities. We share easy-to-follow guides, tips, and resources to help you stay safe online and explore new ways of working in the digital world.

    Our Picks

    Private Compute Services 1.0.release.895254434 APK Download by Google LLC

    April 7, 2026

    GitHub Copilot CLI gets a second-opinion feature built on cross-model review

    April 7, 2026

    Google’s Mueller On SEO Gurus Who Are “Clueless Imposters”

    April 7, 2026
    Most Popular
    • Private Compute Services 1.0.release.895254434 APK Download by Google LLC
    • GitHub Copilot CLI gets a second-opinion feature built on cross-model review
    • Google’s Mueller On SEO Gurus Who Are “Clueless Imposters”
    • I used the Vivo X300 Ultra for a week, and I can’t believe a phone camera is this good
    • New GPUBreach attack enables system takeover via GPU rowhammer
    • Waymo is set to launch its London pilot this month, here’s what you need to know
    • Wynn Resorts Says 21,000 Employees Affected by ShinyHunters Hack
    • Higher standards, AI influence, and a web still catching up
    © 2026 WifiPortal.tech. Designed by WifiPortal.tech.
    • Home
    • About Us
    • Contact Us
    • Privacy Policy
    • Terms and Conditions
    • Disclaimer

    Type above and press Enter to search. Press Esc to cancel.