AMD's Zen platform is reportedly vulnerable to Rowhammer attacks, as revealed in new research by ETH Zurich, affecting the usability of DRAM.
Rowhammer is quite an old vulnerability, initially discovered in 2014 through collaborative research by Carnegie Mellon University and Intel. This breach affects your DRAM's contents by prompting an electric leakage in memory cells, potentially flipping the bits present to corrupt the data in the memory. Moreover, it could also lead to intruders getting access to sensitive information, and the vulnerability has expanded to AMD's Zen systems, which is why it is labeled as "Zenhammer" now.
Independent researchers from ETH Zurich have found a way to disrupt your memory contents through the Rowhammer implementation, by flipping the bits in DDR4 memory mounted in Zen 2 and Zen 3 systems. Here is how they were able to do it:
The research showed that AMD systems were vulnerable, similar to how Intel-based systems are, and after successfully exploiting the secret DRAM address functions, the researchers were able to adjust the timing routine and, through extensive tests, were able to integrate Rowhammer's effects into the systems, flipping the memory contents in both Zen 2 and Zen 3 systems. While this situation is alarming for relatively old AMD consumers, Team Red has responded quickly to the problem and released a security brief to address it.
For users particularly concerned with Zenhammer, we advise them to implement mitigations suggested by Team Red themselves to stay safe from the vulnerability. Meanwhile, the company is working on assessing the situation and providing a more extensive update.
News Sources: The Register, Comsec
Read more on wccftech.com