
MiniPlasma Zero-Day Revives 2020 Flaw, Exposing Unpatched Windows Cloud Filter to Systemic Enterprise Takeover
Persistent unpatched Windows zero-day in Cloud Files driver grants SYSTEM escalation, amplifying risks to enterprise and government systems beyond initial reports.
The MiniPlasma vulnerability in cldflt.sys represents more than a missed patch; it signals deeper structural issues in Microsoft's handling of cloud-integrated file system components that underpin enterprise hybrid environments. Originally flagged by Google Project Zero's James Forshaw in 2020 under CVE-2020-17103, the flaw's persistence suggests either incomplete remediation or a silent rollback that prioritized compatibility over security hardening. This aligns with patterns seen in prior Windows filter driver exploits, such as those enabling ransomware deployment across government and defense contractor networks. Unlike the original coverage, this issue intersects with recent active exploitation of the same driver in CVE-2025-62221, raising the prospect of chained attacks that bypass modern endpoint detection. Public PoC availability accelerates weaponization risks for nation-state actors targeting critical infrastructure, where Windows-based cloud sync services handle sensitive data flows. Enterprises relying on fully patched May 2026 builds face immediate exposure, as the race condition reliably yields SYSTEM access outside Insider Preview builds.
SENTINEL: This flaw's survival into 2026 heightens risks of targeted intrusions against hybrid cloud setups in defense and critical sectors, demanding immediate driver isolation or third-party mitigation.
Sources (3)
- [1]Primary Source(https://thehackernews.com/2026/05/miniplasma-windows-0-day-enables-system.html)
- [2]Related Source(https://msrc.microsoft.com/update-guide/vulnerability/CVE-2020-17103)
- [3]Related Source(https://googleprojectzero.blogspot.com/2020/09/)