ctipilot.ch

Windows Cloud Filter driver cldflt.sys privilege escalation (MiniPlasma PoC)

cve · CVE-2020-17103

Coverage timeline
2
first 2026-05-18 → last 2026-05-19
Briefs
2
2 distinct
Sources cited
114
54 hosts
Sections touched
0
Co-occurring entities
5
see Related entities below

Story timeline

  1. 2026-05-19CTI Daily Brief — 2026-05-19
  2. 2026-W21CTI Weekly Summary — 2026-W21 (Mon 18 – Sun 24, 2026)

Source distribution

  • attack.mitre.org25 (22%)
  • bleepingcomputer.com5 (4%)
  • thehackernews.com5 (4%)
  • helpnetsecurity.com4 (4%)
  • microsoft.com4 (4%)
  • msrc.microsoft.com4 (4%)
  • theregister.com4 (4%)
  • nvd.nist.gov3 (3%)
  • other60 (53%)

Related entities

External references

NVD · cve.org · CISA KEV

All cited sources (114)

Items in briefs about Windows Cloud Filter driver cldflt.sys privilege escalation (MiniPlasma PoC) (1)

UPDATE: Chaotic Eclipse Windows zero-days — MiniPlasma is third PoC in series; cldflt.sys CfAbortHydration path, claimed re-exploitable CVE-2020-17103 regression

From CTI Daily Brief — 2026-05-19 · published 2026-05-19 · view item permalink →

UPDATE (originally covered 2026-05-15): Researcher "Chaotic Eclipse" / "Nightmare Eclipse" released a third unpatched Windows LPE PoC on 2026-05-17 — MiniPlasma — extending the YellowKey and GreenPlasma series covered in the 2026-05-15 daily (BleepingComputer, 2026-05-17; The Hacker News, 2026-05-18). The material new technical detail: MiniPlasma targets the cldflt.sys Cloud Filter Mini Filter Driver — specifically the HsmOsBlockPlaceholderAccess routine — and abuses the undocumented CfAbortHydration API to create arbitrary registry keys in the .DEFAULT user hive without proper ACL checks, escalating from standard user to SYSTEM. The flaw was originally reported by Google Project Zero (James Forshaw) in September 2020 and nominally patched in December 2020 as CVE-2020-17103; Chaotic Eclipse asserts the exact same code path remains exploitable on fully-patched Windows 11 with May 2026 cumulative updates applied. Will Dormann independently confirmed the PoC opens a SYSTEM cmd.exe reliably on Windows 11 Pro fully patched. The exploit reportedly fails on the latest Insider Preview Canary builds, suggesting Microsoft has a fix in the pipeline but has not yet released an out-of-band patch. ThreatLocker published two registry-path hunt pivots: \Registry\User\Software\Policies\Microsoft\CloudFiles\BlockedApps* and \Registry\User\.DEFAULT\Volatile Environment*.

Defender takeaway: the proliferation of unpatched LPEs from one researcher signals an extended period of SYSTEM-shell availability for any attacker that lands user-level execution on Windows endpoints. Sysmon EID 13 (RegistryEvent / SetValue) on the .DEFAULT hive from non-SYSTEM processes is the primary hunt pivot; Sysmon EID 6 driver-load monitoring catches related driver-abuse paths. Hardening: BitLocker PIN mitigates the companion YellowKey BitLocker bypass; disabling Cloud Files / OneDrive integration removes the MiniPlasma attack surface but is not practical in most environments. MITRE T1068 (Exploitation for Privilege Escalation).