CVE-2025-6202

Published Sep 15, 2025

Last updated 9 days ago

Overview

AI description

Automated description summarized from trusted sources.

CVE-2025-6202 is a vulnerability in SK Hynix DDR5 memory on x86 platforms. It allows a local attacker to trigger Rowhammer bit flips, which can compromise hardware integrity and system security. The vulnerability affects DDR5 DIMMs produced between January 2021 and December 2024. This vulnerability, also known as the Phoenix attack, bypasses existing Rowhammer defenses in DDR5 memory. Repeated access to a row of memory can cause bit flips in adjacent rows, leading to data corruption. It has been proven that on-die ECC does not prevent Rowhammer attacks, making end-to-end attacks possible even with DDR5 memory.

Description
Vulnerability in SK Hynix DDR5 on x86 allows a local attacker to trigger Rowhammer bit flips impacting the Hardware Integrity and the system's security. This issue affects DDR5: DIMMs produced from 2021-1 until 2024-12.
Source
vulnerability@ncsc.ch
NVD status
Awaiting Analysis

Risk scores

CVSS 4.0

Type
Secondary
Base score
7.1
Impact score
-
Exploitability score
-
Vector string
CVSS:4.0/AV:L/AC:H/AT:N/PR:L/UI:N/VC:N/VI:H/VA:N/SC:H/SI:H/SA:H/E:X/CR:X/IR:X/AR:X/MAV:X/MAC:X/MAT:X/MPR:X/MUI:X/MVC:X/MVI:X/MVA:X/MSC:X/MSI:X/MSA:X/S:X/AU:X/R:X/V:X/RE:X/U:X
Severity
HIGH

Weaknesses

134c704f-9b21-4f2e-91b3-4a467353bcc0
CWE-404

Social media

Hype score
Not currently trending
  1. Phoenix: El nuevo ataque Rowhammer en chips DDR5 https://t.co/ronTQcHn5N Se dio a conocer información sobre una nueva técnica de ataque de clase Rowhammer llamada Phoenix (CVE-2025-6202), capaz de sortear los mecanismos de protección TRR (Target Row Refresh) presentes en chip

    @laboratoriolinu

    23 Sept 2025

    40 Impressions

    0 Retweets

    0 Likes

    0 Bookmarks

    0 Replies

    0 Quotes

  2. ⌨️Researchers Eth Zürich and Google found an attack pHOenix Rowhammer (Cve-2025-6202) that bypasses even modern protection DDR5-memoryAnd with ECC and Trr. On test modules Sk Hynix 2021-2024 years of expression allowed to break Ssh, steal RSA-Keys and raise the rights to Roo

    @Hack_Your_Mom

    17 Sept 2025

    18 Impressions

    0 Retweets

    0 Likes

    0 Bookmarks

    0 Replies

    0 Quotes

  3. Phoenix attack exploits DDR5 memory from SK Hynix, bypassing TRR protections by manipulating specific refresh intervals. It triggers bit flips on 15 memory chips, allowing privilege escalation to gain root access in under two minutes. CVE-2025-6202 affects DIMM modules produced

    @bigmacd16684

    17 Sept 2025

    1 Impression

    0 Retweets

    0 Likes

    0 Bookmarks

    0 Replies

    0 Quotes

  4. DDR5 Security vulnerabilities called "Pheonix" - Rowhammer attack method - TRR protection mechanism can be bypassed at certain refresh times - Impact all DDR5 memory manufactured 2021 Jan ~ 2024 Dec / CVE-2025-6202 - Only way to mitigate, triple tREFI. But can cause instability h

    @harukaze5719

    17 Sept 2025

    2695 Impressions

    9 Retweets

    29 Likes

    9 Bookmarks

    2 Replies

    2 Quotes

  5. Phoenix: Rowhammer Attacks On DDR5 DIMM Memory Modules Manufactured Between 2021-2024. It is tracked as CVE-2025-6202. #Brazil, #saopaulo, #SantaCatarina, #Sweden, #USA, #SouthKorea, #Europe, #Hardware, #DDR5, #Cybersecurity, #ITSecurity. Learn more here: https://t.co/et0qDzqmLo

    @kingops3c

    17 Sept 2025

    6 Impressions

    0 Retweets

    0 Likes

    0 Bookmarks

    0 Replies

    0 Quotes

  6. تیمی از محققان دانشگاه ETH زوریخ و گوگل نوع جدیدی از حمله RowHammer را کشف کرده‌اند که قادر است سیستم‌های حافظه DDR5 ساخت شرکت کره‌ای SK Hynix را هدف قرار دهد. این حم

    @Teeegra

    16 Sept 2025

    763 Impressions

    0 Retweets

    11 Likes

    1 Bookmark

    0 Replies

    0 Quotes

  7. 📌 اكتشف باحثون من ETH زوريخ وجوجل نسخة جديدة من هجوم "RowHammer" تستهدف شرائح الذاكرة DDR5 من شركة SK Hynix. يُعرف الهجوم باسم "Phoenix" (CVE-2025-6202، score: 7.1) وقادر على تجاوز آل

    @Cybercachear

    16 Sept 2025

    58 Impressions

    0 Retweets

    0 Likes

    0 Bookmarks

    0 Replies

    0 Quotes

  8. 🔥 New hardware hack ALERT: ETH Zürich + Google just broke SK Hynix DDR5 memory wide open. ➡️ “Phoenix” (CVE-2025-6202) gets ROOT in 109s on SK Hynix chips ➡️ ECC & TRR defenses? ❌ Bypassed ➡️ RSA keys + sudo at risk Full story → https://t.co/THAAnkk

    @TheHackersNews

    16 Sept 2025

    72357 Impressions

    41 Retweets

    141 Likes

    41 Bookmarks

    5 Replies

    4 Quotes

  9. CVE-2025-6202 Vulnerability in SK Hynix DDR5 on x86 allows a local attacker to trigger Rowhammer bit flips impacting the Hardware Integrity and the system's security. This issue affe… https://t.co/I2fVwfhCVS

    @CVEnew

    15 Sept 2025

    3 Impressions

    0 Retweets

    0 Likes

    0 Bookmarks

    0 Replies

    0 Quotes