GPUBreach bypasses IOMMU on GDDR6-based NVIDIA GPUs

Researchers from the University of Toronto describe GPUBreach, a rowhammer attack against GDDR6-based NVIDIA GPUs that can bypass IOMMU protections. The technique enables CPU-side privilege escalation by abusing trusted GPU driver behavior on the host system.

Researchers from the University of Toronto have introduced GPUBreach, a rowhammer attack targeting GDDR6-based NVIDIA GPUs that can bypass IOMMU and enable CPU-side privilege escalation. The attack stands apart from earlier GDDRHammer and GeForge techniques, which were largely mitigated by enabling IOMMU through the BIOS to limit the memory regions a GPU can access on the host system.

In typical server, workstation, and PC configurations, IOMMU restricts the GPU’s access to the CPU’s physical addresses and blocks the direct memory access patterns used in conventional DMA-based attacks. GPUBreach operates through a different path. Rather than relying on unrestricted access to host memory, it targets memory-safe bugs in the GPU driver and corrupts them while the GPU remains confined to driver-assigned buffers.

When IOMMU limits direct memory access to permitted buffers, the exploit corrupts metadata within those buffers. This causes the driver, which has kernel privileges enabled on the CPU host, to perform out-of-band writes to the buffer, effectively bypassing the protection IOMMU is designed to provide. Because this trust model is built into the kernel by default and the GPU driver is treated as one of the operating system’s most trusted components, corrupted metadata can turn the driver itself into the mechanism for the bypass.

The result is a more serious outcome than earlier rowhammer attacks against these GPUs. GPUBreach grants an attacker full root privilege escalation, shifting the impact from memory corruption alone to direct compromise of the host CPU side. That makes the attack notable not just for bypassing IOMMU, but for exploiting the interaction between GPU memory behavior and privileged driver logic on the host.

72

Impact Score

OpenAI expands ChatGPT ads with self-serve manager

OpenAI is widening its ChatGPT ads pilot with a beta self-serve Ads Manager, new bidding options and broader measurement tools. The push signals a deeper move into advertising as the company expands the program into several international markets.

OpenAI launches Artificial Intelligence deployment consulting unit

OpenAI has created a new consulting and deployment business aimed at helping enterprises build and roll out Artificial Intelligence systems. The move mirrors a similar push by Anthropic and signals a broader effort by model providers to capture more of the enterprise services market.

SK Group warns DRAM shortages could curb memory use

SK Group chairman Chey Tae-won warned that customers may reduce memory consumption through infrastructure and software optimization if DRAM suppliers fail to raise output. Demand from Artificial Intelligence data centers is keeping the market tight as memory makers weigh expansion against the long timelines for new fabs.

BitUnlocker bypasses TPM-only Windows 11 BitLocker

Intrinsec disclosed BitUnlocker, a downgrade attack that can bypass TPM-only Windows 11 BitLocker protections with physical access to a machine. The technique abuses a flaw in Windows recovery and deployment components and relies on older trusted boot code.

Contact Us

Got questions? Use the form to contact us.

Contact Form

Clicking next sends a verification code to your email. After verifying, you can enter your message.