GPUBreach Exploits GDDR6 Rowhammer for Full System Takeover
University of Toronto researchers demonstrate GPUBreach, a GPU rowhammer attack that bypasses IOMMU protections to achieve root access on systems with NVIDIA GPUs. Consumer GPUs remain unmitigated.
A team of researchers from the University of Toronto has demonstrated a novel attack technique that weaponizes GPU memory vulnerabilities to achieve complete system compromise, including root shell access on systems protected by IOMMU.
The attack, dubbed GPUBreach, represents a significant escalation over previous GPU-based attacks because it successfully bridges the gap between GPU memory corruption and CPU-side privilege escalation—something security researchers have long theorized but rarely demonstrated in practice.
How GPUBreach Works
The attack exploits a well-known memory corruption technique called rowhammer, but applies it to GDDR6 memory found in modern graphics cards rather than traditional DDR DRAM. By repeatedly accessing adjacent memory rows at high frequency, an attacker can induce electrical interference that flips bits in neighboring rows without directly accessing them.
What makes GPUBreach particularly dangerous is its attack chain. First, an unprivileged CUDA kernel induces bit-flips in GDDR6 memory. These bit-flips corrupt GPU page tables (PTEs), granting the attacker arbitrary read/write access to GPU memory. The attacker then exploits memory-safety vulnerabilities in the NVIDIA driver to pivot from GPU to CPU, ultimately achieving root access.
Previous GPU rowhammer research, including GDDRHammer and GeForge, required disabling IOMMU protections to achieve meaningful exploitation. GPUBreach bypasses this limitation entirely by targeting driver vulnerabilities rather than attempting to escape hardware-enforced memory isolation.
Affected Systems and Scope
The researchers demonstrated GPUBreach on an NVIDIA RTX A6000—a high-end professional GPU commonly used in AI development, scientific computing, and data center workloads. However, the underlying vulnerability affects any GDDR6-based GPU without error-correcting code (ECC) protection.
Consumer GPUs from NVIDIA, AMD, and other manufacturers typically lack ECC memory, making them vulnerable to this class of attack. The researchers noted that even data center GPUs with ECC enabled are not immune, as multi-bit flips can potentially evade error correction.
"Consumer GPUs are completely unmitigated," the research team stated in their paper, which will be presented at the IEEE Symposium on Security & Privacy on April 13.
Google, one of the vendors notified about the vulnerability, awarded a $600 bug bounty—a figure that sparked debate on security forums given the severity of the demonstrated impact.
Detection and Mitigation Challenges
Organizations face limited options for defending against GPUBreach. System-level ECC memory, enabled by default on NVIDIA Hopper and Blackwell architecture data center GPUs, provides some protection but is not a complete solution against multi-bit corruption scenarios.
For enterprises running AI workloads or GPU-accelerated computing, the attack surface is substantial. Shared GPU resources in cloud environments or containerized workloads could potentially be exploited by a malicious tenant to escape isolation boundaries.
The November 2025 disclosure to NVIDIA, Google, AWS, and Microsoft gave vendors five months to develop mitigations before public release. Whether effective patches exist remains unclear—NVIDIA has not issued a public advisory addressing the specific attack chain demonstrated by GPUBreach.
Why This Matters
Hardware-level attacks like GPUBreach are notoriously difficult to patch through software updates alone. Unlike vulnerabilities in web applications or cloud platforms that can be fixed server-side, rowhammer attacks exploit fundamental physics of memory design.
The growing deployment of GPUs for AI inference, cryptocurrency operations, and general-purpose computing expands the potential attack surface significantly. As organizations increasingly rely on GPU acceleration, attacks targeting GPU memory become correspondingly more valuable to adversaries.
Security teams should audit GPU-accelerated workloads, particularly those processing untrusted inputs. Isolation mechanisms between GPU tenants should be evaluated against this new attack primitive. For high-security environments, the research suggests that only ECC-enabled data center GPUs offer meaningful protection.
The full technical details and proof-of-concept will be available following the IEEE presentation next week.
Related Articles
MiniPlasma Zero-Day Grants SYSTEM on Patched Windows — PoC Released
Chaotic Eclipse drops working exploit for Windows Cloud Filter driver flaw allegedly patched in 2020. Race condition in cldflt.sys spawns SYSTEM shell on Windows 11.
May 18, 2026OpenClaw 'Claw Chain' Flaws Let Attackers Steal Data and Plant Backdoors
Cyera discloses four chainable OpenClaw vulnerabilities (CVE-2026-44112 through 44118) exposing 245,000 servers to credential theft, privilege escalation, and persistent access.
May 16, 2026Linux Fragnesia Flaw Gives Any Local User Root Access Without Racing
CVE-2026-46300 exploits a logic bug in the XFRM ESP-in-TCP subsystem to corrupt page cache and gain root. Kernel patches rolling out now—mitigation available.
May 15, 2026Researcher Drops YellowKey BitLocker Bypass, GreenPlasma SYSTEM Exploit
A disgruntled researcher released two unpatched Windows zero-days: YellowKey bypasses BitLocker encryption via USB, while GreenPlasma grants SYSTEM privileges. No patches available yet.
May 14, 2026