MiniPlasma: the explosion that shows that cldflt.sys failure persists despite the CVE-2020-17103 patch

Published 4 min de lectura 22 reading

A researcher who calls himself Chaotic Eclipse (also known as Nightmare Eclipse) has published in GitHub a concept test explosion called MiniPlasma which, according to your tests and those of third parties, allows you to scale privileges to SYSTEM in Windows facilities that are, in appearance, completely patched.

Vulnerability affects Windows's Cloud Filter driver, identified as cldflt.sys, and exploits a routine linked to the process of "hydration" of files in the cloud through an undocumented API (CfAbortHydration). The technique allows you to create arbitrary entries in the .DEFAULT registration hive without correct access checks, which can serve as a vector to raise privileges from a standard user account to SYSTEM.

MiniPlasma: the explosion that shows that cldflt.sys failure persists despite the CVE-2020-17103 patch
Image generated with IA.

This failure had originally been reported by James Forshaw of Google Project Zero in 2020 and assigned as CVE-2020-17103 with a patch published by Microsoft in December of that year. The central point of the publication of MiniPlasma is that, according to Chaotic Eclipse, the problem persists despite that patch - either the correction never correctly reached all versions or was reversed - and the original 2020 PoC worked without changes over current systems.

Independent tests by media researchers and response teams confirm that MiniPlasma works in recent public versions of Windows 11 (including May 2026 patch editions), although not in the last building of the Insider channel at the time of the tests. This suggests that Microsoft may be testing internal mitigation or that exposure is dependent on specific combinations of versions and system components.

The real gravity of an escalation to SYSTEM cannot be underestimated: a local attacker with the ability to run code (e.g. by phishing that runs binaries or attachments, or by another local execution bug) could use MiniPlasma to take full control of the system, install persistent backdoors, deactivate detection and exfilter data. In business environments, this facilitates side movements and elevations to domains with critical consequences.

In addition to the technical impact, the form of disclosure raises an ethical debate. The author has said that he publishes exploits in protest of his experience with the supplier's reward program and vulnerability management, and in the previous weeks he has already released other PoC (BlueHammer, RedSun, YellowKey, GreenPlasma). Publishing functional code presses suppliers but also accelerates the exposure window for organizations that have not yet applied mitigation.

For safety managers and equipment, the immediate priority should be to reduce the risk area and increase detection capacity. Practical recommendations include deploying and ensuring a modern EDR / AV solution with behavior telemetry, activating and tuning Sysmon rules to record changes in the record and key creation in HKEY _ USERS\\ .DEFAULT, and looking for signs of processes that attempt to manipulate the cldflt.sys driver or make unusual calls related to cloud file hydration. IOC searches should focus on binaries from public repositories that match PoC and high shells that appear in standard user accounts.

As for provisional technical mitigation, options involving disabling drivers or system functions should be tested first in a laboratory, because they can break legitimate functionalities such as OneDrive Files On-Demand. It is preferable to apply compensatory controls: reduce the amount of accounts with local privileges, tighten execution policies (AppLocker or Windows Defender Application Control), restrict users' ability to install software and use blocking policies for Internet-downloaded devices. Maintain an inventory of endpoints and prioritize attention to machines with access to sensitive data or critical services.

MiniPlasma: the explosion that shows that cldflt.sys failure persists despite the CVE-2020-17103 patch
Image generated with IA.

If your organization detects potential exploitation, isolate the affected equipment, preserve the relevant login (Sysmon, EDR, Windows Event Logs) and proceed with a forensic analysis. Notify the security officers and, where appropriate, report the incident to Microsoft and the incident response teams using your company. For technical follow-up and historical context, see both the original Project Zero report and the CVE tab: Project Zero report and the official Microsoft entry in your update guide CVE-2020-17103.

It is also useful to review the author's own publication and the repository where the PoC uploaded to understand the operational risk and decide on specific measures to block indicators, for example by blocking downloads from that URL in proxy and filtering systems: GitHub's Nightmare-Eclipse profile. Do not execute PoC in productive networks without a controlled environment: doing so can cause damage or open legal liability.

In short, MiniPlasma recalls that the existence of a declared patch does not always amount to complete risk elimination. Organizations should combine patches, in-depth defence, system change visibility and rapid response procedures. The priority now is to identify potential holdings, mitigate impact on critical assets and monitor Microsoft official communications to apply final corrections as soon as they are published.

Coverage

Related

More news on the same subject.