A security researcher known as Chaotic Eclipse has disclosed a new zero-day local privilege escalation (LPE) vulnerability in Microsoft Windows, dubbed "MiniPlasma." The vulnerability allows an attacker with low-level user access to gain full SYSTEM privileges on a fully patched Windows 11 system. Alarmingly, this is not a new flaw but a regression of CVE-2020-17103, a vulnerability discovered by Google Project Zero in 2020 and reportedly patched. The public release of a working proof-of-concept (PoC) exploit presents a significant risk to organizations, as it enables attackers who have gained an initial foothold to take complete control of affected endpoints. No patch is currently available from Microsoft, requiring organizations to rely on detection and mitigation strategies.
The MiniPlasma vulnerability resides in the Windows Cloud Files Mini Filter Driver (cldflt.sys), a core component for handling placeholder files linked to cloud storage. The specific flaw is within the HsmOsBlockPlaceholderAccess function, which is responsible for managing access to these placeholder files. The function fails to implement a necessary security check when handling file operations.
Technically, the vulnerability is triggered because the driver does not specify the OBJ_FORCE_ACCESS_CHECK flag when creating registry keys in the context of a low-privileged user. This omission allows an unprivileged process to create arbitrary registry keys within the .DEFAULT user hive, which is normally restricted. By manipulating these registry keys, an attacker can hijack system processes or create conditions that lead to code execution with SYSTEM privileges. The researcher confirmed that the original PoC for CVE-2020-17103 works without modification, indicating that Microsoft's 2020 patch was either ineffective, incomplete, or was reversed in a later update.
The vulnerability has been confirmed to affect modern, fully patched versions of:
Independent testing has shown the exploit does not appear to work on the latest Windows Insider Preview Canary builds, suggesting a fix may be in development. However, all current stable releases are considered vulnerable.
The researcher Chaotic Eclipse has publicly released a proof-of-concept (PoC) exploit for MiniPlasma. The release is part of a series of zero-day disclosures by the researcher, who has cited frustrations with Microsoft's bug bounty program. Security researcher Will Dormann has independently verified that the exploit works as described on an updated Windows 11 system. The public availability of the PoC significantly increases the likelihood of its adoption by threat actors for post-exploitation activities.
The primary impact of MiniPlasma is local privilege escalation. An attacker who has already gained initial access to a system through other means (e.g., phishing, malware) can use this exploit to elevate their permissions from a standard user to SYSTEM. This gives them complete control over the compromised machine, allowing them to:
In multi-user environments such as terminal servers or workstations shared by multiple employees, this vulnerability is particularly dangerous as it allows any standard user to become a full system administrator.
No specific Indicators of Compromise (IOCs) such as file hashes, IP addresses, or domains were mentioned in the source articles.
Security teams may want to hunt for the following patterns that could indicate exploitation of MiniPlasma or similar LPE techniques:
cmd.execmd.exe or powershell.exe running as NT AUTHORITY\SYSTEM spawned by a non-system user process.cldflt.syscldflt.sys driver from unexpected processes.HKEY_USERS\.DEFAULT.DEFAULT user registry hive by low-privileged user accounts.4688SYSTEM integrity.As there is no patch, detection and response are critical. Security teams should focus on identifying post-exploitation behavior.
SYSTEM privileges by a parent process running in a standard user context. This is a strong indicator of LPE.4688 (Process Creation), with user session information. Create rules to flag any process launched by a user's logon session that suddenly runs as SYSTEM.HKEY_USERS\.DEFAULT. Alerts should be generated if non-system processes attempt to modify this hive.cldflt.sys followed by the execution of privileged commands.Defensive techniques from the D3FEND framework such as Process Analysis and System Call Analysis are highly relevant for building detection logic.
Until an official patch is released by Microsoft, organizations should implement compensating controls to reduce risk.
From a D3FEND perspective, countermeasures like User Account Permissions (Hardening) and Local Account Monitoring (Detect) are key to mitigating the impact of this vulnerability.
Enforce the principle of least privilege to limit the impact of a successful LPE exploit. Standard users should not have administrative rights.
Use application control and sandboxing to prevent untrusted code from running and interacting with sensitive system components like kernel drivers.
Implement comprehensive logging of process creation and registry modifications to detect suspicious activity indicative of LPE attempts.
Utilize application whitelisting solutions to prevent the execution of unauthorized exploit code on endpoints.
Google Project Zero researcher James Forshaw discovers the original vulnerability, later assigned CVE-2020-17103.
Microsoft releases a patch for CVE-2020-17103 as part of its December 2020 Patch Tuesday.
Researcher Chaotic Eclipse publicly releases the 'MiniPlasma' proof-of-concept exploit, demonstrating the 2020 patch is no longer effective.

Cybersecurity professional with over 10 years of specialized experience in security operations, threat intelligence, incident response, and security automation. Expertise spans SOAR/XSOAR orchestration, threat intelligence platforms, SIEM/UEBA analytics, and building cyber fusion centers. Background includes technical enablement, solution architecture for enterprise and government clients, and implementing security automation workflows across IR, TIP, and SOC use cases.
Help others stay informed about cybersecurity threats
Every tactic, technique, and sub-technique used in this threat has been identified and mapped to the MITRE ATT&CK framework for consistent, actionable threat language.
Observables and indicators of compromise (IOCs) have been extracted and cataloged. Risk has been assessed and correlated with known threat actors and historical campaigns.
Detection rules, incident response steps, and D3FEND-aligned mitigation strategies are included so your team can act on this intelligence immediately.
Structured threat data is packaged as a STIX 2.1 bundle and can be visualized as an interactive graph — relationships between actors, malware, techniques, and indicators.
Sigma detection rules are derived from the threat techniques in this article and can be converted for deployment across any major SIEM or EDR platform.