MiniPlasma Windows 0-Day Grants SYSTEM Privileges on Patched Systems
A new Windows privilege escalation zero-day, codenamed MiniPlasma, has been disclosed by security researcher Chaotic Eclipse. The Hacker News reports that this vulnerability allows attackers to gain SYSTEM privileges on fully patched Windows systems. Chaotic Eclipse is also credited with discovering the YellowKey and GreenPlasma Windows flaws.
The MiniPlasma vulnerability specifically impacts “cldflt.sys,” which is the Windows Cloud Files Mini Filter Driver. The release of a proof-of-concept (PoC) by Chaotic Eclipse indicates a high likelihood of this flaw being exploited in the wild, posing an immediate threat to Windows environments.
This isn’t just another bug; it’s a direct path to SYSTEM. The attacker’s calculus here is simple: if they can get initial access, this PoC gives them full control. For defenders, this means any foothold on a Windows machine could escalate quickly into a total compromise. Patching isn’t enough when a zero-day is actively exploited with a public PoC.
What This Means For You
- If your organization relies on Windows systems, especially those with cloud file synchronization enabled, assume this vulnerability is exploitable. Prioritize reviewing your EDR/XDR logs for any suspicious activity related to `cldflt.sys` or unexpected privilege escalation attempts. While a patch isn't available yet, focus on limiting initial access vectors and enhancing behavioral detection for post-exploitation lateral movement.
Related ATT&CK Techniques
🛡️ Detection Rules
3 rules · 6 SIEM formats3 detection rules auto-generated for this incident, mapped to MITRE ATT&CK. Sigma YAML is free — export to any SIEM format via the Intel Bot.
Privilege Escalation via MiniPlasma cldflt.sys Driver
Indicators of Compromise
| ID | Type | Indicator |
|---|---|---|
| MiniPlasma | Privilege Escalation | Windows Cloud Files Mini Filter Driver (cldflt.sys) |
| MiniPlasma | Privilege Escalation | Windows operating systems (fully patched) |