Rowhammer GPU attacks represent a fundamental shift in how researchers understand memory vulnerabilities on discrete graphics processors. What was once confined to CPU memory is now a serious threat on Nvidia’s high-end GPUs, capable of granting attackers root-level access and complete control over both GPU and host CPU memory.
Key Takeaways
- Rowhammer exploits read disturbance in DRAM by hammering memory rows, causing bit flips in adjacent rows.
- First practical Rowhammer GPU attack demonstrated on Nvidia A6000, achieving up to 8 bit-flips across 4 DRAM banks.
- RTX 3060 showed 1,171 bit flips; RTX 6000/6008 showed 202 bit flips in testing.
- GPUBreach attack chain corrupts GPU memory allocator and page tables to grant arbitrary read/write access.
- Nvidia confirmed the issue January 15, 2025; fix pending with embargo until August 12, 2025.
How Rowhammer GPU attacks work
Rowhammer GPU attacks exploit the same fundamental vulnerability that has plagued CPU memory for years: repeated access to a row of DRAM causes bit flips in adjacent victim rows. On GPUs, this attack becomes more potent because it bridges the security boundary between the GPU and the host CPU, something previous CPU-focused exploits could not do as effectively.
The attack uses synchronized hammering patterns—researchers tested n-sided patterns with n=8, 12, 16, 20, and 24—targeting specific DRAM banks on Nvidia’s GDDR6 memory. The GPUHammer campaign demonstrated this on the Nvidia A6000, inducing systematic bit flips that could be weaponized. The critical exploit step targets the GPU’s memory allocator with controlled bit flips, corrupting GPU page tables and enabling arbitrary read/write access to CPU memory without requiring any privileged software paths. Once the GPU-CPU boundary is breached, an attacker gains root shell access and total system control.
This differs sharply from traditional CPU Rowhammer because GPUs present unique obstacles: proprietary physical-to-GDDR bank and row mapping, higher memory latency, faster refresh rates, and proprietary mitigations built into GDDR6 itself. Researchers had to develop entirely new attack patterns to overcome these defenses, proving that GPU memory is not inherently safer simply because it uses a different memory type.
Which Nvidia GPUs are vulnerable to Rowhammer attacks
Testing confirmed vulnerability on specific Nvidia models, though the full scope remains partially unclear. The Nvidia A6000 was the primary demonstration target, achieving up to 8 bit-flips across 4 DRAM banks. The RTX 3060 proved highly vulnerable with 1,171 bit flips observed during testing, while the RTX 6000 and RTX 6008 showed 202 bit flips. Out of 25 Nvidia GPUs tested, only a few demonstrated vulnerability.
The researchers targeted Ampere to Ada Lovelace GPU families, but confirmed vulnerabilities are limited to specific models. One security researcher noted that it is likely the attacks work on most or all consumer Ampere cards depending on their GDDR memory type, and they might extend to more recent GPU generations. However, this remains speculative—only the models listed above have been formally tested and confirmed vulnerable.
The vulnerability is particularly concerning because these are not budget consumer cards. The A6000 is a datacenter GPU, and the RTX 6000/6008 are workstation-class processors used in professional environments where multi-user access and shared computing resources are common. In cloud GPU environments or shared ML infrastructure, this attack surface becomes a serious risk.
Impact on shared GPU environments and AI systems
The real danger emerges in multi-user scenarios where multiple applications or users share GPU resources. In cloud computing, machine learning platforms, and enterprise environments, a single malicious user could exploit Rowhammer GPU attacks to compromise the entire system and access other users’ data. Researchers demonstrated that tampering with ML models via controlled bit flips can cause up to 80% accuracy degradation, showing that the attack is not merely theoretical—it has measurable real-world consequences.
This is fundamentally different from CPU Rowhammer in one critical way: GPUs are increasingly central to AI workloads, and shared GPU access is becoming standard in cloud infrastructure. An attacker no longer needs to compromise the CPU directly; compromising the GPU grants equivalent access. The GPUBreach attack chain proves this by showing how GPU memory corruption translates directly to CPU memory control and root shell access.
No Rowhammer attacks have been observed in the wild to date, which means organizations have time to prepare. However, the responsible disclosure timeline is tight. Nvidia confirmed the issue on January 15, 2025, and the embargo extends until August 12, 2025, at which point the research team will publish code on GitHub.
Nvidia’s response and the disclosure timeline
Nvidia confirmed the vulnerability and is investigating fixes, according to responsible disclosure notification on January 15, 2025. The embargo period runs until August 12, 2025, giving Nvidia approximately seven months to develop and test mitigations before the attack code becomes public. Once the embargo lifts, the research team plans to release the exploit code on GitHub at https://github.com/sith-lab/gpuhammer, allowing security researchers and system administrators to test their own environments.
The extended embargo is unusual but justified given the severity of the vulnerability and the complexity of patching GDDR6 memory systems. Unlike CPU mitigations, which can sometimes be addressed through firmware updates, GPU memory vulnerabilities may require hardware-level fixes or architectural changes that take longer to implement and validate.
What this means for GPU security going forward
Rowhammer GPU attacks open an entirely new research frontier. CPUs have spent over a decade developing mitigations—refresh rate adjustments, targeted row refreshes, and access pattern detection. GPUs are now entering that same cycle, but from behind. The proprietary nature of GPU memory controllers and the lack of transparency around GDDR6 implementations make it harder for independent researchers to develop comprehensive defenses.
The broader lesson is that moving workloads to GPUs does not inherently improve security. It shifts the attack surface. As AI and machine learning increasingly depend on GPU acceleration, and as more sensitive workloads run on shared GPU infrastructure, memory vulnerabilities become more critical. Organizations using high-end Nvidia GPUs in multi-user environments should treat this disclosure seriously and plan for patched hardware once Nvidia releases fixes.
Is my Nvidia GPU vulnerable to Rowhammer attacks?
Only specific models have been confirmed vulnerable: the RTX 3060, RTX 6000, RTX 6008, and A6000. If you use one of these cards, you are potentially at risk if your system is shared with untrusted users or connected to a network where attackers could gain code execution. If you use other Nvidia GPUs, the risk is lower but not zero—the researchers believe most Ampere consumer cards may be vulnerable depending on their specific GDDR memory configuration.
When will Nvidia release a fix for Rowhammer GPU attacks?
Nvidia is investigating fixes with an embargo lifting August 12, 2025. The company has not announced a specific patch date, but organizations should expect updates sometime after the embargo period. Hardware-level fixes may take longer than software patches, so some users may need to upgrade to newer GPU generations for complete protection.
How different is Rowhammer GPU attacks from CPU Rowhammer?
The core mechanism is identical—repeated memory access causes bit flips in adjacent rows—but the impact is far greater on GPUs. CPU Rowhammer typically requires local code execution, while GPU Rowhammer can be triggered through GPU kernel code, making it accessible in cloud environments where users submit GPU workloads. Additionally, GPU Rowhammer breaches the GPU-CPU boundary, granting access to host memory and root privileges without additional exploits. This makes it a more complete attack chain than most CPU variants.
The discovery of practical Rowhammer GPU attacks forces a reckoning with how we think about GPU security in shared environments. For the next seven months, organizations running vulnerable Nvidia hardware should audit their access controls and prepare for patched systems. Once the embargo lifts and code becomes public, the window for unpatched systems closes rapidly. This is not a distant theoretical threat—it is a concrete vulnerability affecting production hardware used in real AI and machine learning pipelines today.
Edited by the All Things Geek team.
Source: TechRadar


