BotBeat
...
← Back

> ▌

NVIDIANVIDIA
RESEARCHNVIDIA2026-04-09

Researchers Demonstrate GPU Privilege Escalation via Rowhammer, Bypassing IOMMU Protections

Key Takeaways

  • ▸GPU Rowhammer attacks can achieve full privilege escalation to root shell, not just data corruption, by targeting GPU page tables in GDDR6 memory
  • ▸The attack chains GPU-side compromise into CPU-side root access by exploiting memory-safety vulnerabilities in the NVIDIA kernel driver
  • ▸Unlike concurrent research, GPUBreach succeeds with IOMMU protections enabled, making it applicable to real-world hardened systems following security best practices
Source:
Hacker Newshttps://gpubreach.ca/↗

Summary

University of Toronto researchers have discovered a critical vulnerability in NVIDIA GPUs that enables privilege escalation attacks through Rowhammer exploitation of GPU memory. The attack, called GPUBreach, demonstrates how bit-flips in GDDR6 memory can corrupt GPU page tables, allowing unprivileged CUDA kernels to gain arbitrary GPU memory read/write access. The research goes further than previous GPU Rowhammer work by chaining the GPU-side exploit into CPU-side root privilege escalation by exploiting memory-safety bugs in the NVIDIA driver—all while IOMMU protections remain enabled, a scenario considered more realistic than concurrent research.

The attack chain involves three key steps: corrupting GPU page tables through targeted Rowhammer bit-flips, leveraging the compromise to gain arbitrary GPU memory access, and then exploiting NVIDIA driver vulnerabilities to escalate privileges to the CPU kernel level. The researchers demonstrated the attack on NVIDIA RTX A6000 GPUs and showed practical exploitation scenarios including extraction of post-quantum cryptography keys from NVIDIA's cuPQC library, stealthy manipulation of machine learning models in cuBLAS, and spawning of root shells. The research is particularly significant because it works with IOMMU enabled—the recommended security configuration—unlike concurrent work by other institutions, making it a more potent and realistic threat to production systems.

  • Demonstrated attack scenarios include stealing post-quantum cryptography keys, stealthy ML model manipulation, and arbitrary CPU/GPU memory access across processes

Editorial Opinion

GPUBreach represents a significant escalation in GPU security threats, demonstrating that hardware-level vulnerabilities like Rowhammer can have system-wide implications beyond what was previously understood. The ability to achieve CPU privilege escalation while IOMMU protections remain active is particularly concerning, as it undermines a fundamental assumption of GPU security architecture. This research underscores the urgent need for both hardware manufacturers and software developers to address memory-safety vulnerabilities in GPU drivers and consider additional mitigation strategies for Rowhammer attacks at the GPU level.

Machine LearningAI HardwareCybersecurityResearch

More from NVIDIA

NVIDIANVIDIA
INDUSTRY REPORT

Veteran Game Artist Praises NVIDIA DLSS 5 Technology for Next-Gen Game Development

2026-04-09
NVIDIANVIDIA
OPEN SOURCE

Parakeet-Unified-En-0.6B: New Open-Source ASR Model Enables Both Offline and Streaming Speech Recognition

2026-04-08
NVIDIANVIDIA
RESEARCH

NVIDIA's Cosmos-Predict2.5 Achieves 1.4x Speedup on AMD MI300X GPUs, Challenging NVIDIA's Hardware Dominance

2026-04-07

Comments

Suggested

Neo4jNeo4j
OPEN SOURCE

Neo4j Launches neo4j-agent-memory: Open-Source Library Adds Complete Memory System to AI Agents

2026-04-09
OpenAIOpenAI
PRODUCT LAUNCH

OpenAI Plans Staggered Rollout of New Model Over Cybersecurity Concerns

2026-04-09
AppleApple
RESEARCH

Developer Successfully Runs 1.7B Parameter LLM on Apple Watch

2026-04-09
← Back to news
© 2026 BotBeat
AboutPrivacy PolicyTerms of ServiceContact Us