Windows Zero-Day 'MiniPlasma' Gives SYSTEM Access on Patched PCs

Key Takeaways

- MiniPlasma exploit grants SYSTEM privileges on fully patched Windows 11 systems
- The underlying vulnerability was reportedly fixed by Microsoft in December 2020 but remains exploitable
- This is the fourth Windows zero-day disclosure from the same researcher in recent weeks
A 2020 Fix That Wasn't
Security researcher Chaotic Eclipse (also known as Nightmare Eclipse) has published a proof-of-concept exploit called MiniPlasma that grants attackers SYSTEM-level privileges on Windows machines. The catch: Microsoft claims to have fixed this vulnerability nearly six years ago.
The exploit targets a flaw in the Windows Cloud Filter driver (cldflt.sys), specifically in a routine called HsmOsBlockPlaceholderAccess. Google Project Zero researcher James Forshaw originally reported this vulnerability to Microsoft in September 2020. Microsoft assigned it CVE-2020-17103 and released a patch in December 2020.
According to Chaotic Eclipse, that patch either never worked or was rolled back at some point. The researcher wrote that "the exact same issue that was reported to Microsoft by Google project zero is actually still present, unpatched." Forshaw's original proof-of-concept from 2020 reportedly works without any modifications.
Confirmed Working on Current Windows 11
BleepingComputer tested the exploit on a fully patched Windows 11 Pro system running the May 2026 Patch Tuesday updates. Starting from a standard user account, the exploit opened a command prompt with SYSTEM privileges.

Will Dormann, principal vulnerability analyst at Tharros, independently confirmed the exploit works on the latest public version of Windows 11. He noted one exception: the flaw does not work in the Windows 11 Insider Preview Canary build, suggesting Microsoft may have addressed it in an unreleased update.
How the Exploit Works
The vulnerability abuses how the Windows Cloud Filter driver handles registry key creation through an undocumented API called CfAbortHydration. Forshaw's original report explained that the flaw allows arbitrary registry keys to be created in the .DEFAULT user hive without proper access checks. This can be chained into full privilege escalation.
Chaotic Eclipse released both source code and a compiled executable on GitHub. BleepingComputer has contacted Microsoft for comment but has not received a response.
Fourth Zero-Day from Same Researcher
MiniPlasma is the latest in a series of Windows zero-day disclosures from Chaotic Eclipse over the past several weeks. The streak began in April with BlueHammer, a local privilege escalation flaw tracked as CVE-2026-33825. That was followed by RedSun, another privilege escalation vulnerability, and UnDefend, a denial-of-service tool targeting Windows Defender.
What Organizations Should Do
With no working patch available for the public release of Windows 11, defenders have limited options. The exploit requires local access, so standard endpoint security practices apply: restrict local user accounts, monitor for suspicious privilege escalation, and watch for execution of unknown binaries.
Organizations running the Windows Insider Preview Canary build appear to be protected, though that build is not suitable for production environments. Microsoft has not issued guidance on this specific vulnerability.
Logicity's Take
Frequently Asked Questions
What is the MiniPlasma Windows exploit?
MiniPlasma is a proof-of-concept exploit that allows attackers with local access to escalate privileges to SYSTEM level on fully patched Windows 11 systems. It targets a flaw in the Windows Cloud Filter driver (cldflt.sys).
Is MiniPlasma a new vulnerability?
No. The underlying flaw was reported to Microsoft in September 2020 by Google Project Zero and assigned CVE-2020-17103. Microsoft released a patch in December 2020, but the researcher claims that patch is ineffective.
Which Windows versions are affected by MiniPlasma?
The exploit has been confirmed working on fully patched Windows 11 Pro with May 2026 updates. It does not work on the Windows 11 Insider Preview Canary build.
How can I protect against MiniPlasma?
No public patch is currently available. Limit local user access, monitor for privilege escalation, and maintain standard endpoint security controls. The exploit requires local access to the target machine.
Who released the MiniPlasma exploit?
A security researcher using the names Chaotic Eclipse and Nightmare Eclipse published the exploit on GitHub, including source code and a compiled executable.
Need Help Implementing This?
Source: BleepingComputer
Huma Shazia
Senior AI & Tech Writer
Related Articles
Browse all
Kraken Crypto Exchange Extortion: Hackers Threaten to Leak Internal Videos After Insider Breach
Cryptocurrency exchange Kraken is being extorted by hackers who obtained videos of internal systems through bribed support employees. The company says no funds were compromised and refuses to pay, with only about 2,000 accounts affected. Kraken is working with federal law enforcement to prosecute everyone involved.

Windows 11 KB5083769 and KB5082052: April 2026 Patch Tuesday Brings Smart App Control Changes and Security Fixes
Microsoft's April 2026 Patch Tuesday updates are now live for Windows 11, bringing critical security patches alongside a welcome change to Smart App Control. You can finally toggle SAC on or off without wiping your entire system. The updates cover versions 23H2, 24H2, and 25H2.

Zero Trust Identity Security: 5 Ways This Framework Actually Stops Credential Theft
Stolen credentials caused 22% of breaches in 2025, making them the top attack vector. Zero Trust promises to fix this, but only when it's built around identity as the core principle. Here's how organizations can implement it properly.
Open Source PR Backlogs: Why Your GitHub Contribution Sits Unreviewed for a Year
A developer's Jellyfin pull request has been waiting over a year for merge despite two approvals, exposing a systemic crisis in open source maintenance. Queuing theory explains why backlogs grow exponentially, and 60% of maintainers have quit or considered quitting due to burnout.
Also Read

Spotify Claude vs ChatGPT: Which AI Makes Better Playlists?
Spotify's new Claude integration competes directly with its existing ChatGPT feature for AI-powered playlist creation. A hands-on test with identical prompts reveals a clear winner for music discovery and personalization.

7 Creative Project Management Tools for Agencies in 2026
Creative agencies face unique project management challenges: deliverables stuck in feedback loops, projects quietly over budget, and teams waiting on indecisive clients. Zapier's latest roundup tests the best software options for managing this controlled chaos.

Android Gets iPhone-Style Handoff With 'Continue On' in Android 17
Google announced Continue On at I/O, a platform-level feature that lets Android users start tasks on their phone and pick them up on a tablet. The feature works like Apple's Handoff and arrives with Android 17, though it's limited to phone-to-tablet transfers at launch.