MiniPlasma and cldflt.sys: the privilege race that could convert Windows patched into SYSTEM

Published 4 min de lectura 21 reading

The researcher known as Chaotic Eclipse recently published a proof-of-concept (PoC) that takes advantage of a vulnerability of climbing privileges on Windows, baptized as MiniPlasma, which supposedly allows an attacker to obtain SYSTEM privileges on apparently fully-parked machines. The failure is located in the file filter controller in the Windows cloud, cldflt.sys, in a routine called HsmOsBlockPlaceholderAccess; according to the author, the same root of the problem was originally reported by James Forshaw of Google Project Zero in 2020.

The technical history is relevant: in September 2020 Forshaw described a problem that Microsoft mitigated in December of that year under CVE-2020-17103, but Chaotic Eclipse claims that the original condition - a race condition in the mini-filter code - it remains present in practice and the original PoC works unchanged to produce a console with SYSTEM privileges. The nature of the race conditions makes the exploitation dependent on timmings and the environment, but precisely why they can be difficult to correct reliably and remain latent behind apparent patches; for general technical context you can consult Project Zero and Microsoft's warnings on vulnerabilities: Google Project Zero and Microsoft Security Response Center.

MiniPlasma and cldflt.sys: the privilege race that could convert Windows patched into SYSTEM
Image generated with IA.

The practical implications are clear and serious: a local escalation to SYSTEM opens the door for total equipment control, persistence, backdoors installation and side advance in corporate networks. Several external researchers, including Will Dormann, indicated that the operation works reliably in Windows 11 systems with the updates of May 2026, although not in all branches of Insider; this suggests that the problem is not limited to a specific version and that its risk is significant in heterogeneous environments.

Historically it is not the first time that the cldflt.sys component appears in security notices: Microsoft also treated in December 2025 another climbing vulnerability in the same driver (CVE-2025-62221) identified as being exploited in the field. This antecedent highlights two points: on the one hand, that controllers related to cloud storage integration are attractive targets for their position in the system stack; on the other, that mitigation may require deep reviews and tests to avoid regressions or incomplete patches.

MiniPlasma and cldflt.sys: the privilege race that could convert Windows patched into SYSTEM
Image generated with IA.

What can and should managers and security officials do right now? First of all, not to assume that "patching" means absence of risk: review official notices and apply all Microsoft recommended updates. In addition, it is appropriate to strengthen compensatory controls: to reduce local privileges to the minimum necessary, to apply implementation blocking policies and whitelisting, to set up EDR and IMS rules to detect unexpected processes running as NT AUTHORITY\\ SYSTEM (e.g. cmd.exe or powershell.exe initiated with that token), and to segment stations with access to critical data to limit the impact of a local escalation. Public bases such as NVD are available for central administration and search for CVE: NVD.

For end-users the recommendations are practical and simple: keep Windows up-to-date, avoid running unreliable source code with high privileges and consider, where feasible, deactivating cloud integration features that are not used (e.g. OneDrive On-Demand Files) until there is clarity on final patches; these measures reduce the attack surface to the affected component. Operating tests should be limited to controlled laboratory environments: running a production PoC can compromise systems and leave evidence difficult to clean.

Finally, it is important to remember that the publication of public PoC accelerates the need for coordinated responses: incident response teams must prioritize the detection of local steps, review historical telemetry in search of suspicious executions such as SYSTEM shells and prepare containment plans. Maintaining communication with suppliers, following the official Microsoft channel for updates and validating patches in test environments before massively deploying them are practices that are now more critical than ever.

Coverage

Related

More news on the same subject.