MiniPlasma Zero-Day Grants SYSTEM on Patched Windows — PoC Released
Chaotic Eclipse drops working exploit for Windows Cloud Filter driver flaw allegedly patched in 2020. Race condition in cldflt.sys spawns SYSTEM shell on Windows 11.
Security researcher Chaotic Eclipse has released a working proof-of-concept exploit for a Windows privilege escalation zero-day that allegedly bypasses a patch Microsoft shipped six years ago. The vulnerability, dubbed MiniPlasma, affects the Windows Cloud Files Mini Filter Driver and grants SYSTEM-level access on fully updated Windows 11 systems.
The exploit works reliably on machines running the latest May 2026 Patch Tuesday updates, according to independent testing by security researcher Will Dormann.
A Patch That Never Was
MiniPlasma targets cldflt.sys, specifically a routine called HsmOsBlockPlaceholderAccess. The same component was the subject of a Google Project Zero report back in September 2020, when researcher James Forshaw identified the flaw and reported it to Microsoft.
Microsoft assigned CVE-2020-17103 and claimed to have addressed the issue in December 2020. But according to Chaotic Eclipse's analysis, "the exact same issue is actually still present, unpatched."
Whether Microsoft never fully patched the bug or silently rolled back the fix remains unclear. The researcher noted uncertainty about how a six-year-old "patched" vulnerability remains exploitable: "I'm unsure if Microsoft just never patched the issue or the patch was silently rolled back."
This isn't an isolated case. Microsoft patched a related vulnerability in the same driver, CVE-2025-62221, as recently as December 2025 with a CVSS score of 7.8.
How the Exploit Works
The attack exploits a race condition in how cldflt.sys handles registry key creation through an undocumented CfAbortHydration API. By winning the race, an attacker can escalate from standard user to SYSTEM privileges.
BleepingComputer tested the publicly available PoC on a fully patched Windows 11 Pro system. Using a standard user account, the exploit successfully spawned a command prompt running as SYSTEM.
The race condition nature means success rates vary depending on system load and timing, but the exploit proves reliable enough for practical attacks. Interestingly, the exploit does not appear to work on the latest Windows 11 Insider Preview Canary builds, suggesting Microsoft may have quietly addressed the issue in pre-release code without backporting the fix.
Chaotic Eclipse's Track Record
This marks the third significant Windows zero-day disclosure from Chaotic Eclipse in 2026. The researcher previously released YellowKey and GreenPlasma, which targeted BitLocker bypass and privilege escalation. Earlier, RedSun demonstrated how Windows Defender's cloud rollback mechanism could be abused for SYSTEM access.
The pattern suggests a researcher frustrated with Microsoft's vulnerability handling process. Each disclosure has come with public PoC code on GitHub, giving defenders limited time to implement workarounds before attackers weaponize the techniques.
What Administrators Should Do
Microsoft has not yet issued an advisory or CVE for MiniPlasma. Until an official patch arrives:
- Monitor for exploitation - Watch for unusual activity involving cldflt.sys or Cloud Files functionality
- Limit local access - The exploit requires local user access, making phishing and initial access vectors the primary concern
- Test Canary builds - Organizations in the Windows Insider program should verify whether pre-release builds mitigate the issue
- Review EDR alerts - Privilege escalation to SYSTEM from standard user accounts should trigger investigation
Why This Matters
MiniPlasma joins a growing list of Windows vulnerabilities where patches either fail to fully address the underlying issue or get inadvertently regressed. The BlueHammer, RedSun, and UnDefend Defender zero-days earlier this year demonstrated similar problems with Microsoft's patch completeness.
For organizations running hybrid cloud environments, the cldflt.sys driver handles cloud file synchronization and placeholder files—functionality deeply integrated into Windows. A privilege escalation in this component could have particular impact on systems using OneDrive, Azure Files, or third-party cloud storage providers that leverage the Windows Cloud Filter API.
The exploit code is public. Expect integration into post-exploitation frameworks within days.
Related Articles
RedSun: Second Windows Defender Zero-Day Drops in Two Weeks
Frustrated researcher 'Chaotic Eclipse' releases RedSun, another Windows Defender privilege escalation exploit granting SYSTEM access. Microsoft has not yet patched this second zero-day.
Apr 17, 2026OpenClaw 'Claw Chain' Flaws Let Attackers Steal Data and Plant Backdoors
Cyera discloses four chainable OpenClaw vulnerabilities (CVE-2026-44112 through 44118) exposing 245,000 servers to credential theft, privilege escalation, and persistent access.
May 16, 2026Linux Fragnesia Flaw Gives Any Local User Root Access Without Racing
CVE-2026-46300 exploits a logic bug in the XFRM ESP-in-TCP subsystem to corrupt page cache and gain root. Kernel patches rolling out now—mitigation available.
May 15, 2026Researcher Drops YellowKey BitLocker Bypass, GreenPlasma SYSTEM Exploit
A disgruntled researcher released two unpatched Windows zero-days: YellowKey bypasses BitLocker encryption via USB, while GreenPlasma grants SYSTEM privileges. No patches available yet.
May 14, 2026