top of page

Your GPU Is Your Attack Surface. Rowhammer Just Proved It.

  • Writer: Patrick Duggan
    Patrick Duggan
  • Apr 3
  • 5 min read

Two research teams dropped papers yesterday showing that NVIDIA GPUs are vulnerable to Rowhammer attacks. Not theoretical. Not in a lab. Hundreds to thousands of bit flips on production hardware — RTX 3060, RTX A6000 — giving the attacker full control of the host machine through the GPU's memory.


The GPU that trains your AI model. The GPU that renders your cloud workload. The GPU that powers the inference engine your customers depend on. It's an attack surface. It always was. Now there's proof.



How It Works


Rowhammer is a hardware vulnerability. You repeatedly access the same row of memory — "hammer" it — and the electrical interference causes bits to flip in adjacent rows. A 0 becomes a 1. A 1 becomes a 0. The memory corrupts.


CPU Rowhammer has been known since 2014. Mitigations exist — ECC memory, Target Row Refresh (TRR), address scrambling. The industry spent a decade hardening CPU DRAM against it.


Nobody hardened the GPU.


GDDRHammer and GeForge — the two papers released yesterday — extend Rowhammer into GPU GDDR6 memory. The attack chain:


  1. Hammer GPU memory rows — repeatedly access the same GDDR6 addresses through compute shaders

  2. Bit flips accumulate — hundreds to thousands per session on Ampere-architecture cards

  3. GPU page tables corrupt — the maps that tell the GPU what memory it can access get rewritten by the flipped bits

  4. GPU accesses CPU memory — the corrupted page tables redirect GPU DMA into host system memory

  5. Full machine compromise — the GPU becomes an uncontrolled DMA engine with access to everything

The GPU doesn't need to be "hacked" in the traditional sense. The physics of the memory does the work. The attacker just needs to run a compute workload that hammers the right rows.



What's Vulnerable



Hardware

Architecture

GDDR

Vulnerable

ECC

RTX 3060

Ampere

GDDR6

Yes

No

RTX A6000

Ampere

GDDR6

Yes

Optional

RTX 4090

Ada Lovelace

GDDR6X

Likely

No

A100

Ampere

HBM2e

Research needed

Yes

H100

Hopper

HBM3

Research needed

Yes

RTX 5090

Blackwell

GDDR7

Mitigated

On-die ECC


The Ampere architecture is confirmed vulnerable. That's the current workhorse of every AI training cluster, every cloud GPU instance, and every research lab on earth. The RTX 3060 is the most popular GPU on Steam. The A6000 is the enterprise standard.


NVIDIA says GDDR7 (GeForce RTX 50 series) implements on-die ECC that "indirectly helps protect." Translation: the new cards might be safe. Everything deployed today is not.



Why This Matters



Cloud GPU Instances


AWS, Azure, and GCP offer GPU instances where multiple tenants share physical GPU hardware through virtualization (MIG on A100/H100, or time-sharing on consumer-grade cards). If Tenant A can hammer GPU memory and flip bits in page tables, Tenant A can potentially:


  • Read Tenant B's model weights

  • Corrupt Tenant B's training data

  • Escape the GPU sandbox into host memory

  • Access the hypervisor

Multi-tenant GPU is the foundation of cloud AI. Rowhammer makes it a shared attack surface.



AI Model Integrity


GPUHammer — a variant published in July 2025 — already demonstrated that Rowhammer bit flips can degrade AI model accuracy during training. Flip the right bits in the right weight matrices and the model learns wrong. The training looks normal. The loss curves look normal. The model just produces subtly incorrect results.


For a medical imaging model: wrong diagnosis. For a financial model: wrong risk assessment. For a military targeting model: wrong coordinates.


The model was never "hacked." The physics of the memory did the work. No logs. No alerts. No indicators of compromise.



The IRGC Connection


NVIDIA is on the IRGC's 18-company target list. NVIDIA GPUs power the military AI systems, satellite imagery analysis, and signals intelligence that the US and Israel are using against Iran right now.


If an adversary can Rowhammer a GPU in a military AI pipeline — not over the network, but through a co-located workload on the same physical hardware — they can corrupt the model that's making targeting decisions. No firewall stops a physics exploit in shared memory.


The Stryker attack used Microsoft Intune to wipe devices. The Cisco FMC attack used Java deserialization for root access. The GPU Rowhammer attack uses electromagnetic interference in memory cells to compromise the host. Each one exploits trust — the trust that your management tool, your security console, your GPU memory is safe.



The Pattern


This week's thesis, one more time:



Day

Your Tool

What Happened

Monday

CrowdStrike Falcon

Bricked 8.5M machines (2024)

Monday

Microsoft Intune

Handala wiped 200K Stryker devices

Monday

Aqua Trivy

Credential stealer in CI/CD scanner

Tuesday

Cisco FMC

CVSS 10.0, root via firewall management

Wednesday

LinkedIn

6,222 browser extensions scanned without consent

Wednesday

FBI wiretap network

Salt Typhoon inside since February

Thursday

NVIDIA GPU

Rowhammer gives full machine control through memory physics


The management console. The security scanner. The social network. The surveillance system. The graphics card.


Every layer of the stack that you trust is a layer that can be weaponized. The GPU was supposed to be the dumb compute engine — just matrix math, nothing dangerous. Except the matrix math can flip bits in the memory that controls what the GPU can access, and the GPU has DMA to your entire system.


Trust and access. All the way down to the physics.



Mitigations


Enable IOMMU in BIOS. This prevents the GPU from accessing restricted host memory even if page tables are corrupted. Performance cost: 5-15% on GPU-intensive workloads. Most cloud providers don't enable it by default because customers complain about the performance hit.


Enable ECC on GPUs that support it (A6000 optional ECC, A100/H100 HBM ECC). Consumer GPUs (RTX 3060, 4090) don't have ECC. There is no mitigation for consumer hardware.


Isolate GPU tenants on separate physical hardware. Defeats the multi-tenant attack vector but destroys the economics of cloud GPU. Nobody will do this voluntarily.


Upgrade to GDDR7 (RTX 50 series) when available. On-die ECC addresses the root cause. But the installed base of Ampere GPUs won't be replaced for years.


Monitor for Rowhammer signatures — unusual GPU memory access patterns (repeated reads to the same addresses, compute shaders that don't produce useful output). Nobody has built this monitoring yet.



The Research


The papers are at gddr.fail — credit to both research teams for responsible disclosure and a memorable domain.


No CVE assigned yet. No evidence of in-the-wild exploitation. But the proofs-of-concept are published, the hardware is everywhere, and the mitigations have performance costs that production environments won't accept.


The physics was always there. Now someone wrote the exploit.




This is the seventh "your trusted tool is your attack surface" story this week. Monday was endpoint agents. Tuesday was supply chains. Wednesday was management consoles and social networks. Thursday is the GPU itself — the silicon that powers every AI model, every cloud workload, every game, every render.


Trust and access. All the way down to the electrons.


Research: gddr.fail | GDDRHammer + GeForge (April 2, 2026)


bottom of page