GPUBreach Exploits GDDR6 Rowhammer for Full System Takeover
University of Toronto researchers demonstrate GPUBreach, a GPU rowhammer attack that bypasses IOMMU protections to achieve root access on systems with NVIDIA GPUs. Consumer GPUs remain unmitigated.
A team of researchers from the University of Toronto has demonstrated a novel attack technique that weaponizes GPU memory vulnerabilities to achieve complete system compromise, including root shell access on systems protected by IOMMU.
The attack, dubbed GPUBreach, represents a significant escalation over previous GPU-based attacks because it successfully bridges the gap between GPU memory corruption and CPU-side privilege escalation—something security researchers have long theorized but rarely demonstrated in practice.
How GPUBreach Works
The attack exploits a well-known memory corruption technique called rowhammer, but applies it to GDDR6 memory found in modern graphics cards rather than traditional DDR DRAM. By repeatedly accessing adjacent memory rows at high frequency, an attacker can induce electrical interference that flips bits in neighboring rows without directly accessing them.
What makes GPUBreach particularly dangerous is its attack chain. First, an unprivileged CUDA kernel induces bit-flips in GDDR6 memory. These bit-flips corrupt GPU page tables (PTEs), granting the attacker arbitrary read/write access to GPU memory. The attacker then exploits memory-safety vulnerabilities in the NVIDIA driver to pivot from GPU to CPU, ultimately achieving root access.
Previous GPU rowhammer research, including GDDRHammer and GeForge, required disabling IOMMU protections to achieve meaningful exploitation. GPUBreach bypasses this limitation entirely by targeting driver vulnerabilities rather than attempting to escape hardware-enforced memory isolation.
Affected Systems and Scope
The researchers demonstrated GPUBreach on an NVIDIA RTX A6000—a high-end professional GPU commonly used in AI development, scientific computing, and data center workloads. However, the underlying vulnerability affects any GDDR6-based GPU without error-correcting code (ECC) protection.
Consumer GPUs from NVIDIA, AMD, and other manufacturers typically lack ECC memory, making them vulnerable to this class of attack. The researchers noted that even data center GPUs with ECC enabled are not immune, as multi-bit flips can potentially evade error correction.
"Consumer GPUs are completely unmitigated," the research team stated in their paper, which will be presented at the IEEE Symposium on Security & Privacy on April 13.
Google, one of the vendors notified about the vulnerability, awarded a $600 bug bounty—a figure that sparked debate on security forums given the severity of the demonstrated impact.
Detection and Mitigation Challenges
Organizations face limited options for defending against GPUBreach. System-level ECC memory, enabled by default on NVIDIA Hopper and Blackwell architecture data center GPUs, provides some protection but is not a complete solution against multi-bit corruption scenarios.
For enterprises running AI workloads or GPU-accelerated computing, the attack surface is substantial. Shared GPU resources in cloud environments or containerized workloads could potentially be exploited by a malicious tenant to escape isolation boundaries.
The November 2025 disclosure to NVIDIA, Google, AWS, and Microsoft gave vendors five months to develop mitigations before public release. Whether effective patches exist remains unclear—NVIDIA has not issued a public advisory addressing the specific attack chain demonstrated by GPUBreach.
Why This Matters
Hardware-level attacks like GPUBreach are notoriously difficult to patch through software updates alone. Unlike vulnerabilities in web applications or cloud platforms that can be fixed server-side, rowhammer attacks exploit fundamental physics of memory design.
The growing deployment of GPUs for AI inference, cryptocurrency operations, and general-purpose computing expands the potential attack surface significantly. As organizations increasingly rely on GPU acceleration, attacks targeting GPU memory become correspondingly more valuable to adversaries.
Security teams should audit GPU-accelerated workloads, particularly those processing untrusted inputs. Isolation mechanisms between GPU tenants should be evaluated against this new attack primitive. For high-security environments, the research suggests that only ECC-enabled data center GPUs offer meaningful protection.
The full technical details and proof-of-concept will be available following the IEEE presentation next week.
Related Articles
BlueHammer: Researcher Leaks Unpatched Windows Zero-Day Exploit
Security researcher releases working proof-of-concept for BlueHammer, an unpatched Windows Defender privilege escalation flaw enabling SYSTEM access via TOCTOU and path confusion vulnerabilities.
Apr 7, 2026Azure Kubernetes CVE-2026-33105 Hits CVSS 10.0
Microsoft Azure Kubernetes Service has a critical auth bypass (CVE-2026-33105) with a perfect CVSS 10.0 score. Unauthenticated attackers can escalate to cluster admin—patch now.
Apr 3, 2026OpenClaw Bootstrap Replay Bug Enables Admin Takeover (CVE-2026-32987)
Critical CVSS 9.8 flaw in OpenClaw AI agent platform lets attackers replay setup codes for privilege escalation. Patch to version 2026.3.13 immediately.
Mar 30, 2026Ubuntu Desktop Flaw Lets Local Users Escalate to Root
CVE-2026-3888 exploits timing race between snap-confine and systemd-tmpfiles to grant root access on Ubuntu Desktop 24.04+. Qualys researchers demonstrate full privilege escalation.
Mar 23, 2026