CWE
20
Advisory Published
Updated

CVE-2020-10255: Input Validation

First published: Tue Mar 10 2020(Updated: )

Modern DRAM chips (DDR4 and LPDDR4 after 2015) are affected by a vulnerability in deployment of internal mitigations against RowHammer attacks known as Target Row Refresh (TRR), aka the TRRespass issue. To exploit this vulnerability, the attacker needs to create certain access patterns to trigger bit flips on affected memory modules, aka a Many-sided RowHammer attack. This means that, even when chips advertised as RowHammer-free are used, attackers may still be able to conduct privilege-escalation attacks against the kernel, conduct privilege-escalation attacks against the Sudo binary, and achieve cross-tenant virtual-machine access by corrupting RSA keys. The issue affects chips produced by SK Hynix, Micron, and Samsung. NOTE: tracking DRAM supply-chain issues is not straightforward because a single product model from a single vendor may use DRAM chips from different manufacturers.

Credit: cve@mitre.org

Affected SoftwareAffected VersionHow to fix
Micron Ddr4 Sdram
Micron Lpddr4
Samsung Ddr4
Samsung Lpddr4
Skhynix Ddr4 Sdram
Skhynix Lpddr4

Never miss a vulnerability like this again

Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.

Frequently Asked Questions

  • What is the severity of CVE-2020-10255?

    The severity of CVE-2020-10255 is classified as high due to its potential to allow unauthorized memory access.

  • How do I fix CVE-2020-10255?

    To mitigate CVE-2020-10255, it's recommended to update to the latest firmware from the memory manufacturers that address the vulnerability.

  • What types of memory are affected by CVE-2020-10255?

    CVE-2020-10255 affects modern DDR4 and LPDDR4 DRAM chips manufactured after 2015.

  • Can CVE-2020-10255 be exploited remotely?

    CVE-2020-10255 requires physical access to the vulnerable hardware for exploitation.

  • What attack vector is associated with CVE-2020-10255?

    CVE-2020-10255 is associated with RowHammer attacks that exploit memory access patterns.

Contact

SecAlerts Pty Ltd.
132 Wickham Terrace
Fortitude Valley,
QLD 4006, Australia
info@secalerts.co
By using SecAlerts services, you agree to our services end-user license agreement. This website is safeguarded by reCAPTCHA and governed by the Google Privacy Policy and Terms of Service. All names, logos, and brands of products are owned by their respective owners, and any usage of these names, logos, and brands for identification purposes only does not imply endorsement. If you possess any content that requires removal, please get in touch with us.
© 2025 SecAlerts Pty Ltd.
ABN: 70 645 966 203, ACN: 645 966 203