Hackers News Hackers News
  • CyberSecurity News
  • Threats
  • Attacks
  • Vulnerabilities
  • Breaches
  • Comparisons

Social Media

Hackers News Hackers News
  • CyberSecurity News
  • Threats
  • Attacks
  • Vulnerabilities
  • Breaches
  • Comparisons
Search the Site
Popular Searches:
technology Amazon AI
Recent Posts
Infostealer Uses GitHub Releases for Payload Hosting & Evasion
May 8, 2026
Hackers Abuse Signed Logitech Installer for TCLBANK
May 8, 2026
DarkMoon AI Autonomous Pen Testing Platform with 50+
May 8, 2026
Home/CyberSecurity News/GPUBreach Attack: New System-Wide Compromise Enables Root
CyberSecurity News

GPUBreach Attack: New System-Wide Compromise Enables Root

A severe vulnerability, dubbed GPUBreach, enables attackers to achieve a full system compromise, including a root shell. Scheduled for presentation at the IEEE Symposium on Security and Privacy,...

Emy Elsamnoudy
Emy Elsamnoudy
April 7, 2026 2 Min Read
5 0

A severe vulnerability, dubbed GPUBreach, enables attackers to achieve a full system compromise, including a root shell.

Scheduled for presentation at the IEEE Symposium on Security and Privacy, researchers from the University of Toronto show that this exploit elevates GPU Rowhammer attacks from simple data corruption to critical privilege escalation.

Historically, GPU Rowhammer attacks were limited to degrading machine learning models by randomly flipping memory bits. GPUBreach advances this methodology by performing targeted bit flips in GDDR6 memory to corrupt GPU page tables.

By carefully manipulating Unified Virtual Memory (UVM) allocations, attackers can allocate page tables right next to vulnerable memory rows.

Once a Rowhammer bit-flip alters a page table entry, the attacker gains arbitrary read and write access across the entire GPU memory architecture.

Bypassing IOMMU Defenses

The most alarming aspect of GPUBreach is its ability to bridge the gap between the GPU and the CPU without requiring the Input-Output Memory Management Unit (IOMMU) to be disabled.

Standard hardware defenses rely on the IOMMU to restrict Direct Memory Access (DMA) and prevent unauthorized CPU access to memory. However, GPUBreach bypasses this by corrupting trusted metadata within the permitted NVIDIA driver buffers.

This manipulation triggers memory-safety bugs in the kernel driver, causing out-of-bounds writes that ultimately grant the attacker a CPU root shell.

GPUBreach emerged alongside concurrent research projects, GDDRHammer and GeForge. While all three studies successfully demonstrate GPU page-table corruption, GPUBreach stands out as a distinctly more potent threat.

GeForge requires the system’s IOMMU protection to be completely disabled to access CPU memory, and GDDRHammer fails to achieve full CPU privilege escalation.

By successfully exploiting the driver to bypass an active IOMMU, GPUBreach represents a highly realistic attack path against hardened production environments.

Researchers from the University of Toronto found that the consequences of a successful GPUBreach attack are severe across multiple computing domains.

On the GPU side, attackers can execute cross-process attacks and steal sensitive post-quantum cryptographic keys from libraries like NVIDIA cuPQC.

For artificial intelligence workloads, the attack can silently degrade machine learning accuracy to zero or leak confidential weights of Large Language Models (LLMs).

Most importantly, the ability to spawn a root shell means the entire host system is completely compromised. The research team responsibly disclosed the vulnerability to NVIDIA, Google, AWS, and Microsoft in November 2025.

Google awarded a bug bounty for the findings, noting that enabling ECC memory on GPUs like the NVIDIA RTX A6000 can correct single-bit errors.

It is not a foolproof defense against GPUBreach, as complex attack patterns causing multiple bit flips can bypass ECC, leaving even protected systems vulnerable to silent data corruption and exploitation.

Disclaimer: HackersRadar reports on cybersecurity threats and incidents for informational and awareness purposes only. We do not engage in hacking activities, data exfiltration, or the hosting or distribution of stolen or leaked information. All content is based on publicly available sources.

Tags:

AttackBreachExploitSecurityThreatVulnerability

Share Article

Emy Elsamnoudy

Emy Elsamnoudy

Emy is a cybersecurity analyst and reporter specializing in threat hunting, defense strategies, and industry trends. With expertise in proactive security measures, Emily covers the tools and techniques organizations use to detect and prevent cyber attacks. She is a regular speaker at security conferences and has contributed to industry reports on threat intelligence and security operations. Emily's reporting focuses on helping organizations improve their security posture through practical, actionable insights.

Previous Post

Critical Android Zero-Interaction Flaw Enables DoS

Next Post

Threat Intelligence: Rapid Response for Fast MTTR &

No Comment! Be the first one.

Leave a Reply Cancel reply

Your email address will not be published. Required fields are marked *

Popular Posts
NWHStealer Uses Bun Loader, Anti-VM Delivery Chain
May 8, 2026
Mozilla Patches Firefox 0-Days Using Claude Mythos
May 8, 2026
Critical Spring Vulnerabilities Expose Arbitrary Files and GCP Secrets
May 8, 2026
Top Authors
Marcus Rodriguez
Marcus Rodriguez
Sarah simpson
Sarah simpson
Jennifer sherman
Jennifer sherman
Let's Connect
156k
2.25m
285k

Related Posts

Jennifer sherman
By Jennifer sherman
Threats

GlassWorm Attacks macOS via Malicious VS Code…

January 1, 2026
Emy Elsamnoudy
By Emy Elsamnoudy
Attacks

ClickFix Attack Hides Malicious Code via Stegan Security

January 1, 2026
Sarah simpson
By Sarah simpson
Vulnerabilities

MongoBleed Detector Tool Detects Critical MongoDB CVE-

January 1, 2026
Emy Elsamnoudy
By Emy Elsamnoudy
Breaches

Conti Ransomware Gang Leaders & Infrastructure Exposed

January 1, 2026
Hackers News Hackers News
  • [email protected]

Quick Links

  • Contact Us
  • Privacy Policy
  • Terms of service

Categories

Attacks
Breaches
Comparisons
CyberSecurity News
Threats
Vulnerabilities

Let's keep in touch

receive fresh updates and breaking cyber news every day and week!

All Rights Reserved by HackersRadar ©2026

Follow Us