Threat Bulletin: New Windows “MiniPlasma” Zero-Day Enables SYSTEM Privilege Escalation on Fully Patched Hosts



A newly disclosed Windows zero-day vulnerability known as MiniPlasma is generating significant concern across the cyber security community following the public release of weaponised exploit code capable of granting attackers full NT AUTHORITY\SYSTEM privileges on fully patched Windows systems.
The exploit targets the Windows Cloud Filter driver (cldflt.sys), a core Windows component used by cloud synchronisation services such as Microsoft OneDrive.
Researchers claim the vulnerability stems from an incomplete or ineffective fix originally issued by Microsoft in 2020 under CVE-2020-17103, meaning systems believed to be protected may still remain vulnerable.
Unlike remote exploits that require direct internet exposure, MiniPlasma is a local privilege escalation (LPE) vulnerability. This means attackers first need some level of access to a system – such as through phishing, malware, stolen credentials, or an existing foothold – before using the exploit to elevate privileges and take full control of the machine.
The public availability of reliable proof-of-concept (PoC) exploit code significantly increases the likelihood of rapid adoption by ransomware groups, commodity malware operators, and state-aligned threat actors.
MiniPlasma is a privilege escalation exploit that abuses a flaw within the Windows Cloud Filter driver.
In simple terms, it allows an attacker with basic user-level access to trick Windows into granting them the highest possible privileges on the system.
Once successful, the attacker effectively gains:
The exploit reportedly works reliably on modern multi-core Windows systems without requiring administrator rights beforehand.
The attacThe flaw exists within a function called:
HsmOsBlockPlaceholderAccess
inside the cldflt.sys driver.
According to researchers, the vulnerable code improperly handles registry access permissions during certain operations involving the .DEFAULT user hive.
This allows attackers to:
The exploit also abuses:
to achieve privilege escalation.
Once exploited successfully, the PoC launches a SYSTEM-level command shell on the target device.
This attack is particularly concerning because it bypasses many of the controls organisations rely on to Privilege escalation vulnerabilities are among the most dangerous exploit categories because they allow attackers to turn limited access into full system compromise.
MiniPlasma is particularly concerning because:
This dramatically lowers the barrier for attackers following initial compromise.
In practice, a phishing attack or malware infection that would normally have limited permissions could quickly escalate into:
Attackers successfully exploiting MiniPlasma may be able to:
For organisations already facing phishing, malware, or identity-based attacks, this type of privilege escalation exploit can significantly increase the impact of a compromise.
Security teams should monitor for:
Organisations should:
Security teams should hunt for:
Organisations should:
MiniPlasma reflects a broader trend in modern cyber operations where attackers increasingly rely on:
The incident also highlights growing concerns around:
As cloud-integrated Windows components become more deeply embedded across enterprise environments, vulnerabilities affecting these systems may provide attackers with increasingly valuable pathways to full compromise.
MiniPlasma represents a high-risk Windows privilege escalation vulnerability due to the combination of:
The exploit significantly increases the operational risk associated with phishing attacks, malware infections, and low-level compromises by allowing attackers to rapidly escalate privileges and bypass security controls.
For SOC teams, this vulnerability should be treated as a credible near-term operational threat, particularly in environments where attackers may already possess:
Priority should be placed on:
Threats like MiniPlasma demonstrate why organisations need visibility beyond traditional malware detection. NormCyber’s Managed Detection and Response (MDR) service provides continuous monitoring and expert-led threat hunting designed to identify suspicious privilege escalation activity before attackers can establish full control of an environment.
By correlating endpoint telemetry, identity events, registry activity, and behavioural indicators, our SOC analysts can detect signs of SYSTEM-level compromise, token manipulation, EDR tampering, and unusual process execution associated with modern post-compromise attacks. As ransomware groups and advanced threat actors increasingly abuse legitimate Windows functionality to evade traditional controls, NormCyber MDR helps organisations improve detection coverage, accelerate incident response, and reduce the risk of widespread operational impact.
https://github.com/Nightmare-Eclipse/MiniPlasma
https://cybersecuritynews.com/windows-miniplasma-zero-day/