HomeIntelligenceBrief
VULNERABILITY BRIEF🔴 Critical Vulnerability

MiniPlasma Zero‑Day Enables SYSTEM Privilege Escalation on Fully Patched Windows

A new Windows zero‑day, dubbed MiniPlasma, exploits the cldflt.sys Cloud Files driver to grant attackers SYSTEM privileges on fully patched Windows 10/11 and Server installations. The flaw poses a high‑impact risk for any organization relying on Windows endpoints or cloud‑hosted Windows workloads, demanding immediate mitigation and monitoring.

LiveThreat™ Intelligence · 📅 May 18, 2026· 📰 thehackernews.com
🔴
Severity
Critical
VU
Type
Vulnerability
🎯
Confidence
High
🏢
Affected
3 sector(s)
Actions
4 recommended
📰
Source
thehackernews.com

MiniPlasma Zero‑Day Grants SYSTEM Privilege Escalation on Fully Patched Windows Systems

What Happened — Security researcher Chaotic Eclipse released a proof‑of‑concept for “MiniPlasma,” a Windows privilege‑escalation zero‑day that abuses the cldflt.sys Cloud Files Mini Filter driver. The flaw works on fully patched Windows 10/11 and Windows Server editions, granting attackers full SYSTEM rights.

Why It Matters for TPRM

  • Enables attackers to bypass existing endpoint hardening and move laterally across corporate networks.
  • Increases the risk of data exfiltration, ransomware deployment, and supply‑chain compromise for any third‑party that relies on Windows‑based workloads.
  • No vendor patch is available; mitigation must be driven by configuration and monitoring controls.

Who Is Affected — Enterprises across all sectors that run Windows desktops, laptops, or servers—including SaaS providers, MSPs, and cloud‑hosted Windows VMs.

Recommended Actions

  • Immediately review Windows‑based third‑party assets for exposure.
  • Deploy strict application‑allow‑list policies and limit local admin privileges.
  • Enable Windows Defender Exploit Guard and monitor for anomalous cldflt.sys activity.
  • Follow Microsoft advisories for any forthcoming patches and apply them as soon as released.

Technical Notes — The vulnerability resides in cldflt.sys, the Cloud Files Mini Filter driver, and is exploitable via a crafted I/O request that triggers an unchecked pointer dereference. No CVE identifier has been assigned yet. The exploit grants SYSTEM‑level code execution, allowing full control of the host. Source: The Hacker News

📰 Original Source
https://thehackernews.com/2026/05/miniplasma-windows-0-day-enables-system.html

This LiveThreat Intelligence Brief is an independent analysis. Read the original reporting at the link above.

Monitor Your Vendor Risk with LiveThreat™

Get automated breach alerts, security scorecards, and intelligence briefs when your vendors are compromised.