Your Nvidia GPU is your PC’s newest security weakness
When you think about the graphics card in your gaming laptop or desktop, the first thought is probably about performance, maybe power draw or efficiency. It probably isn’t whether or not it’s a security risk. But a newly developed attack uses the super-fast memory in a GPU as a means of gaining elevated privileges in Windows.
Security researchers at the University of Toronto were exploring the GPU Rowhammer attacks from last year. “Row hammer” is a bit of an obscure term, but basically it’s a means of manipulating data in memory by using the physical, electrical properties of incredibly dense memory cells. This is theoretically possible on just about any modern device with RAM, but the relevant part here is attacking the speedy memory on an Nvidia graphics card, which was demonstrated in 2025.
Now the researchers have found a way to leverage these targeted data changes (bit-flips) into read-write access on the GPU, then into elevated permissions system-wide, which could allow an attacker to take over a PC. The read-write access can become a backdoor to “CPU-side escalation,” compromising down to the root shell and bypassing input-output memory management. In extremely simple terms? An apparently harmless process can mess with the memory on an Nvidia graphics card and bypass safety systems to fully take over a computer.
The good news is that while this is a functional attack, it’s only working in a research lab right now. And as BleepingComputer reports, the University of Toronto team reported their results to Microsoft, Nvidia, Google, and Amazon (because this sort of attack could easily be adapted for servers and data centers) late last year. There’s no evidence that attackers are currently using known GPU Rowhammer attacks to spread infiltration beyond the GPU’s memory, even though technically possible.
This is an extremely sophisticated method of attacking a computer, and like most attacks in this category, it isn’t really an issue for individual users to worry about at the consumer level. Unless you work with extremely sensitive government or industrial data, I don’t think you need to rip out your Nvidia RTX card to keep your computer safe. And even if you do, maybe don’t bring out the screwdriver just yet.
Nvidia may update the security guidance it issued in 2025 when the initial vulnerability was discovered, and recommends admins enable Error Correcting Code memory features on industrial GPUs like the RTX A6000 used by the researchers. That can reduce the simpler versions of a GPU Rowhammer attack, though it doesn’t prevent all of them.
Error Correcting Code is not available on consumer-grade GeForce graphics cards. Maybe that would be a more useful feature than, say, an AI slop filter for games.