The attacks allow threat actors to manipulate data stored in memory chips and relies on the predictable memory reuse patterns of standard physical memory allocators, according to the “Drammer: Deterministic Rowhammer Attacks on Mobile Platforms” research paper.
Researchers said the Rowhammer hardware bug can be used to craft powerful attacks and completely subvert a system by exploiting a hardware vulnerability that alters crucial bits of data in a way that completely roots the device.
The attacks have successfully been carried out on a Nexus 4, Nexus 5, LG G4, Motorola Moto G, Samsung Galaxy S4 and S5 and the OnePlus One, although in some cases the results weren't consistent, the report said.
Victor van der Veen, one of the researchers who discovered the exploit, told ARS Technica that the there is no quick software update to patch the problem.
"Until recently, we never even thought about hardware bugs [and] software was never written to deal with them," van der Veen said. "Now, we are using them to break your phone or tablet in a fully reliable way and without relying on any software vulnerability or esoteric feature.”