GPUBreach Technique Exploits GPU Bit-Flips to Achieve Root-Level System Compromise Even with IOMMU Enabled

Views: 101 views

198/69 Wednesday, April 8, 2026

Researchers have disclosed a new attack technique called GPUBreach, which induces bit-flips in GPU memory (GDDR6) to escalate privileges and ultimately take control of a system. The method builds upon the concept of RowHammer, where intentional memory corruption is used to manipulate data. In this case, attackers target GPU memory to corrupt page tables, enabling arbitrary read and write access within GPU memory. This access can then be leveraged to exploit memory safety vulnerabilities in GPU drivers and pivot into CPU-level privilege escalation.

GPUBreach is considered more severe than earlier techniques such as GDDRHammer and GeForge because it can achieve root-level privileges, even when protections like IOMMU (Input-Output Memory Management Unit) are enabled. By exploiting weaknesses in GPU drivers, attackers can bypass critical system defenses. The potential impact is significant, ranging from stealing sensitive data-such as passwords from libraries like cuPQC-to manipulating AI models via libraries like cuBLAS. In some demonstrations, attackers were able to silently degrade AI model accuracy from 80% to 0%, as well as extract model weights from large language models (LLMs).

In terms of mitigation, Error-Correcting Code (ECC) memory can help reduce the risk of single-bit flips but is not sufficient to fully protect against multi-bit flip attacks. Moreover, most consumer-grade GPUs-such as those in laptops and desktops-do not support ECC, leaving them particularly vulnerable. As of now, there is no comprehensive mitigation strategy available for these systems, highlighting a growing security concern in GPU-based computing environments.

Source https://securityaffairs.com/190455/security/gpubreach-exploit-uses-gpu-memory-bit-flips-to-achieve-full-system-takeover.html