Security Software

More information on RAMBleed

In June 2019 researchers from the University of Michigan, Graz University of Technology in Austria, and the University of Adelaide in Australia published details and a proof of concept exploit they called "RAMBleed" (CVE-2019-0174).

Systems using DRAM modules mitigated against Rowhammer-style attacks remain protected from RAMBleed. Additionally, the researchers note that memory encryption, including Intel® Software Guard Extensions (Intel® SGX) can be used to protect systems from RAMBleed attacks.

Protecting our customers and their data continues to be a critical priority for Intel, and we appreciate the efforts of the security community for their ongoing research.


Was this article helpful?YesNo
0% of users found this helpful

Intel technologies’ features and benefits depend on system configuration and may require enabled hardware, software, or service activation. Performance varies depending on system configuration. Check with your system manufacturer or retailer or learn more at www.intel.com.

All information provided here is subject to change without notice. Contact your Intel representative to obtain the latest Intel product specifications and roadmaps.

The products and services described may contain defects or errors known as errata which may cause deviations from published specifications. Current characterized errata are available on request.

Intel provides these materials as-is, with no express or implied warranties.

No product can be absolutely secure.

Intel, the Intel logo, Intel Core, Intel Atom, Intel Xeon, Intel Xeon Phi, Intel® C Compiler, Intel Software Guard Extensions, and Intel® Trusted Execution Engine are trademarks of Intel Corporation in the U.S. and/or other countries.

*Other names and brands may be claimed as the property of others.