The SentinelOne Annual Threat Report - A Defenders Guide from the FrontlinesThe SentinelOne Annual Threat ReportGet the Report
Experiencing a Breach?Blog
Get StartedContact Us
SentinelOne
  • Platform
    Platform Overview
    • Singularity Platform
      Welcome to Integrated Enterprise Security
    • AI for Security
      Leading the Way in AI-Powered Security Solutions
    • Securing AI
      Accelerate AI Adoption with Secure AI Tools, Apps, and Agents.
    • How It Works
      The Singularity XDR Difference
    • Singularity Marketplace
      One-Click Integrations to Unlock the Power of XDR
    • Pricing & Packaging
      Comparisons and Guidance at a Glance
    Data & AI
    • Purple AI
      Accelerate SecOps with Generative AI
    • Singularity Hyperautomation
      Easily Automate Security Processes
    • AI-SIEM
      The AI SIEM for the Autonomous SOC
    • AI Data Pipelines
      Security Data Pipeline for AI SIEM and Data Optimization
    • Singularity Data Lake
      AI-Powered, Unified Data Lake
    • Singularity Data Lake for Log Analytics
      Seamlessly Ingest Data from On-Prem, Cloud or Hybrid Environments
    Endpoint Security
    • Singularity Endpoint
      Autonomous Prevention, Detection, and Response
    • Singularity XDR
      Native & Open Protection, Detection, and Response
    • Singularity RemoteOps Forensics
      Orchestrate Forensics at Scale
    • Singularity Threat Intelligence
      Comprehensive Adversary Intelligence
    • Singularity Vulnerability Management
      Application & OS Vulnerability Management
    • Singularity Identity
      Identity Threat Detection and Response
    Cloud Security
    • Singularity Cloud Security
      Block Attacks with an AI-Powered CNAPP
    • Singularity Cloud Native Security
      Secure Cloud and Development Resources
    • Singularity Cloud Workload Security
      Real-Time Cloud Workload Protection Platform
    • Singularity Cloud Data Security
      AI-Powered Threat Detection for Cloud Storage
    • Singularity Cloud Security Posture Management
      Detect and Remediate Cloud Misconfigurations
    Securing AI
    • Prompt Security
      Secure AI Tools Across Your Enterprise
  • Why SentinelOne?
    Why SentinelOne?
    • Why SentinelOne?
      Cybersecurity Built for What’s Next
    • Our Customers
      Trusted by the World’s Leading Enterprises
    • Industry Recognition
      Tested and Proven by the Experts
    • About Us
      The Industry Leader in Autonomous Cybersecurity
    Compare SentinelOne
    • Arctic Wolf
    • Broadcom
    • CrowdStrike
    • Cybereason
    • Microsoft
    • Palo Alto Networks
    • Sophos
    • Splunk
    • Trellix
    • Trend Micro
    • Wiz
    Verticals
    • Energy
    • Federal Government
    • Finance
    • Healthcare
    • Higher Education
    • K-12 Education
    • Manufacturing
    • Retail
    • State and Local Government
  • Services
    Managed Services
    • Managed Services Overview
      Wayfinder Threat Detection & Response
    • Threat Hunting
      World-Class Expertise and Threat Intelligence
    • Managed Detection & Response
      24/7/365 Expert MDR Across Your Entire Environment
    • Incident Readiness & Response
      DFIR, Breach Readiness, & Compromise Assessments
    Support, Deployment, & Health
    • Technical Account Management
      Customer Success with Personalized Service
    • SentinelOne GO
      Guided Onboarding & Deployment Advisory
    • SentinelOne University
      Live and On-Demand Training
    • Services Overview
      Comprehensive Solutions for Seamless Security Operations
    • SentinelOne Community
      Community Login
  • Partners
    Our Network
    • MSSP Partners
      Succeed Faster with SentinelOne
    • Singularity Marketplace
      Extend the Power of S1 Technology
    • Cyber Risk Partners
      Enlist Pro Response and Advisory Teams
    • Technology Alliances
      Integrated, Enterprise-Scale Solutions
    • SentinelOne for AWS
      Hosted in AWS Regions Around the World
    • Channel Partners
      Deliver the Right Solutions, Together
    • SentinelOne for Google Cloud
      Unified, Autonomous Security Giving Defenders the Advantage at Global Scale
    • Partner Locator
      Your Go-to Source for Our Top Partners in Your Region
    Partner Portal→
  • Resources
    Resource Center
    • Case Studies
    • Data Sheets
    • eBooks
    • Reports
    • Videos
    • Webinars
    • Whitepapers
    • Events
    View All Resources→
    Blog
    • Feature Spotlight
    • For CISO/CIO
    • From the Front Lines
    • Identity
    • Cloud
    • macOS
    • SentinelOne Blog
    Blog→
    Tech Resources
    • SentinelLABS
    • Ransomware Anthology
    • Cybersecurity 101
  • About
    About SentinelOne
    • About SentinelOne
      The Industry Leader in Cybersecurity
    • Investor Relations
      Financial Information & Events
    • SentinelLABS
      Threat Research for the Modern Threat Hunter
    • Careers
      The Latest Job Opportunities
    • Press & News
      Company Announcements
    • Cybersecurity Blog
      The Latest Cybersecurity Threats, News, & More
    • FAQ
      Get Answers to Our Most Frequently Asked Questions
    • DataSet
      The Live Data Platform
    • S Foundation
      Securing a Safer Future for All
    • S Ventures
      Investing in the Next Generation of Security, Data and AI
  • Pricing
Get StartedContact Us
CVE Vulnerability Database
Vulnerability Database/CVE-2020-10255

CVE-2020-10255: Micron DDR4 SDRAM Privilege Escalation Flaw

CVE-2020-10255 is a privilege escalation vulnerability in Micron DDR4 SDRAM related to TRRespass RowHammer attacks. Attackers can trigger bit flips to escalate privileges and access protected memory.

Published: March 4, 2026

CVE-2020-10255 Overview

CVE-2020-10255, also known as TRRespass, is a critical hardware vulnerability affecting modern DRAM chips (DDR4 and LPDDR4 manufactured after 2015). This vulnerability exposes a fundamental weakness in the deployment of Target Row Refresh (TRR), an internal mitigation mechanism designed to protect against RowHammer attacks. Despite DRAM vendors marketing their chips as "RowHammer-free," researchers demonstrated that attackers can bypass TRR protections using a technique called Many-sided RowHammer, enabling bit flips in memory that can lead to severe security compromises.

Critical Impact

Attackers can exploit this hardware vulnerability to conduct privilege-escalation attacks against the kernel and Sudo binary, as well as achieve cross-tenant virtual-machine access by corrupting RSA keys, effectively bypassing memory isolation guarantees.

Affected Products

  • Micron DDR4 SDRAM
  • Micron LPDDR4
  • Samsung DDR4
  • Samsung LPDDR4
  • SK Hynix DDR4 SDRAM
  • SK Hynix LPDDR4

Discovery Timeline

  • 2020-03-10 - CVE-2020-10255 published to NVD
  • 2024-11-21 - Last updated in NVD database

Technical Details for CVE-2020-10255

Vulnerability Analysis

TRRespass represents a significant advancement in RowHammer attack techniques that bypasses the Target Row Refresh (TRR) mitigation deployed in modern DRAM chips. The original RowHammer vulnerability exploits the physical phenomenon where rapidly accessing (hammering) a row of memory cells can cause bit flips in adjacent rows due to electrical interference. DRAM manufacturers implemented TRR as a countermeasure that monitors access patterns and preemptively refreshes rows that appear to be under attack.

The TRRespass research demonstrates that TRR implementations are fundamentally flawed because they cannot track all possible aggressor rows simultaneously. By using "many-sided" hammering patterns—attacking a victim row from multiple aggressor rows—attackers can evade TRR detection and still induce bit flips. The attack does not require any software vulnerabilities; it exploits the physical properties of DRAM cells combined with insufficient hardware mitigations.

The vulnerability enables several attack scenarios including kernel privilege escalation, compromising security-sensitive binaries like Sudo, and cross-tenant attacks in virtualized cloud environments through RSA key corruption. The network attack vector is applicable in cloud scenarios where an attacker in one virtual machine can potentially affect memory used by other tenants.

Root Cause

The root cause lies in the improper input validation (CWE-20) of memory access patterns by TRR implementations. DRAM manufacturers designed TRR to track suspicious access patterns and refresh potentially affected rows, but the implementations have limited capacity for tracking aggressor rows. The TRR mechanism typically monitors only a small number of frequently-accessed rows, assuming attackers would use traditional double-sided RowHammer techniques.

The Many-sided RowHammer attack exploits this limitation by distributing the hammering across many rows, ensuring that no single aggressor row accumulates enough accesses to trigger TRR protection. This means the tracking mechanism fails to identify the attack pattern, allowing bit flips to occur despite the mitigation being active. Additionally, tracking DRAM supply-chain issues is challenging because a single product model from a single vendor may use DRAM chips from different manufacturers.

Attack Vector

The attack requires the attacker to craft specific memory access patterns that bypass TRR detection thresholds. In a many-sided RowHammer attack, the attacker identifies multiple aggressor rows surrounding a target victim row and distributes memory accesses across these aggressors in patterns that evade TRR sampling.

The attack can be executed in several contexts: through JavaScript in web browsers for local attacks, through native code execution in shared hosting environments, or through virtual machine memory access in cloud environments. The attacker manipulates memory access patterns to induce bit flips in critical data structures such as page tables (for privilege escalation), cryptographic keys (for authentication bypass), or security-sensitive application data.

For detailed technical implementation, refer to the VUSec Research Paper and the TRRespass GitHub Repository.

Detection Methods for CVE-2020-10255

Indicators of Compromise

  • Unusual memory access patterns with high-frequency reads to specific memory regions without corresponding writes
  • Abnormal cache flush operations (CLFLUSH instructions) that bypass CPU caches to directly access DRAM
  • Memory-related errors or unexpected bit flips detected in ECC-enabled systems
  • Unexpected privilege escalation events or authentication failures following intensive memory operations

Detection Strategies

  • Deploy hardware performance counters to monitor for anomalous memory access patterns characteristic of RowHammer attacks
  • Implement kernel-level monitoring for excessive cache line flush operations which are required for effective hammering
  • Utilize ECC (Error-Correcting Code) memory to detect and potentially correct single-bit errors, though this is not a complete mitigation
  • Monitor for suspicious patterns of memory allocation that could indicate attempts to achieve specific physical memory layouts

Monitoring Recommendations

  • Enable and monitor ECC memory error logging to identify potential exploitation attempts
  • Implement memory access pattern analysis in virtualized environments to detect cross-VM attack attempts
  • Deploy endpoint detection solutions capable of identifying RowHammer-related behavioral patterns
  • Monitor system logs for kernel panic events or unexpected memory corruption errors

How to Mitigate CVE-2020-10255

Immediate Actions Required

  • Evaluate current DRAM inventory and identify systems using affected DDR4 or LPDDR4 modules from SK Hynix, Micron, or Samsung
  • Enable ECC memory where available to detect and correct single-bit errors (note: this reduces but does not eliminate risk)
  • Implement memory isolation techniques in virtualized environments to increase the difficulty of cross-tenant attacks
  • Consider deploying software-based RowHammer mitigations available in modern operating systems

Patch Information

As a hardware vulnerability, CVE-2020-10255 cannot be fully remediated through software patches. DRAM manufacturers have been made aware of the TRR bypass techniques, and newer generations of memory may include improved mitigations. Organizations should consult with their hardware vendors regarding updated DRAM modules with enhanced TRR implementations.

Operating system vendors have implemented various software mitigations including memory isolation techniques and restricted access to performance monitoring features that could aid attackers. Organizations should ensure their systems are running the latest kernel versions that include these mitigations.

Workarounds

  • Deploy ECC memory to enable detection of bit flips, providing an additional layer of defense against successful exploitation
  • Implement strict memory isolation policies in cloud and virtualized environments to limit cross-tenant attack surfaces
  • Disable JavaScript JIT compilation in high-security environments to prevent browser-based RowHammer attacks
  • Increase DRAM refresh rates where configurable to reduce the window for successful bit flip induction

For additional technical details and research findings, refer to the VUSec TRRespass Project Overview and coverage from The Hacker News.

Disclaimer: This content was generated using AI. While we strive for accuracy, please verify critical information with official sources.

  • Vulnerability Details
  • TypePrivilege Escalation

  • Vendor/TechMicron Ddr4 Sdram

  • SeverityCRITICAL

  • CVSS Score9.0

  • EPSS Probability1.54%

  • Known ExploitedNo
  • CVSS Vector
  • CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:C/C:H/I:H/A:H
  • Impact Assessment
  • ConfidentialityHigh
  • IntegrityNone
  • AvailabilityHigh
  • CWE References
  • CWE-20
  • Technical References
  • Vusec Research Paper

  • GitHub Project Repository

  • The Hacker News Article

  • Antumbral Tweet

  • VU5EC Tweet

  • Vusec Project Overview
  • Latest CVEs
  • CVE-2025-9185: Mozilla Firefox RCE Vulnerability

  • CVE-2025-9184: Mozilla Firefox RCE Vulnerability

  • CVE-2025-9180: Mozilla Firefox Auth Bypass Vulnerability

  • CVE-2025-8030: Mozilla Firefox RCE Vulnerability
Default Legacy - Prefooter | Experience the World’s Most Advanced Cybersecurity Platform

Experience the World’s Most Advanced Cybersecurity Platform

See how our intelligent, autonomous cybersecurity platform can protect your organization now and into the future.

Try SentinelOne
  • Get Started
  • Get a Demo
  • Product Tour
  • Why SentinelOne
  • Pricing & Packaging
  • FAQ
  • Contact
  • Contact Us
  • Customer Support
  • SentinelOne Status
  • Language
  • Platform
  • Singularity Platform
  • Singularity Endpoint
  • Singularity Cloud
  • Singularity AI-SIEM
  • Singularity Identity
  • Singularity Marketplace
  • Purple AI
  • Services
  • Wayfinder TDR
  • SentinelOne GO
  • Technical Account Management
  • Support Services
  • Verticals
  • Energy
  • Federal Government
  • Finance
  • Healthcare
  • Higher Education
  • K-12 Education
  • Manufacturing
  • Retail
  • State and Local Government
  • Cybersecurity for SMB
  • Resources
  • Blog
  • Labs
  • Case Studies
  • Videos
  • Product Tours
  • Events
  • Cybersecurity 101
  • eBooks
  • Webinars
  • Whitepapers
  • Press
  • News
  • Ransomware Anthology
  • Company
  • About Us
  • Our Customers
  • Careers
  • Partners
  • Legal & Compliance
  • Security & Compliance
  • Investor Relations
  • S Foundation
  • S Ventures

©2026 SentinelOne, All Rights Reserved.

Privacy Notice Terms of Use

English