More Information on RAMBleed

ID 767608
Updated 6/10/2019
Version Latest



In June 2019, researchers from the University of Michigan, Graz University of Technology in Austria, and the University of Adelaide in Australia published details and a proof of concept exploit they called "RAMBleed" (CVE-2019-0174).

Systems using DRAM modules mitigated against Rowhammer-style attacks remain protected from RAMBleed. Additionally, the researchers note that memory encryption, including Intel® Software Guard Extensions (Intel® SGX), can be used to protect systems from RAMBleed attacks.

Protecting our customers and their data continues to be a critical priority for Intel, and we appreciate the efforts of the security community for their ongoing research.


Software Security Guidance Home | Advisory Guidance | Technical Documentation | Best Practices | Resources