Tech 7 min read

MiniPlasma SYSTEM LPE on patched Windows 11: cldflt.sys CVE-2020-17103 reappears

IkesanContents

TL;DR

Last updated May 19, 2026

What it hits Windows Cloud Files Mini Filter Driver cldflt.sys, specifically the HsmOsBlockPlaceholderAccess routine

Reach Windows 11, with “all Windows versions likely affected” per the researcher

Reproduces on Fully patched Windows 11 with May 2026 update; reaches a SYSTEM shell (confirmed by Will Dormann)

Fails on Latest Windows 11 Insider Preview Canary build

CVE status No new CVE. The bug is the same one tracked as CVE-2020-17103, supposedly fixed in December 2020

Reliability Race condition; success rate varies between runs

Timeline James Forshaw (Google Project Zero) reported it in September 2020. Microsoft shipped a patch as CVE-2020-17103 in December 2020. The same bug resurfaced in May 2026.

Related CVE CVE-2025-62221, another cldflt.sys flaw at CVSS 7.8, exploited in the wild by unknown threat actors in December 2025

PoC github.com/Nightmare-Eclipse/MiniPlasma (public)

One day after dropping YellowKey and GreenPlasma, researcher Chaotic Eclipse (Nightmare-Eclipse on GitHub) released MiniPlasma.
The claim: CVE-2020-17103 in the Windows Cloud Files Mini Filter Driver, supposedly patched by Microsoft in December 2020, is still the same exploitable bug five years later. The PoC pops a SYSTEM shell on a fully patched Windows 11 with the May 2026 update applied.

Cross-referencing The Hacker News and Bleeping Computer, the part worth pausing on is the timeline. In December 2025, a different flaw in the same driver — CVE-2025-62221 — was exploited in the wild by unknown threat actors. Right after that, the original CVE-2020-17103 turned out to be reachable again.
The patch never went away on paper, but the underlying bug walked back into the binary.

Timeline: CVE-2020-17103 to MiniPlasma

WhenWhat
2020-09James Forshaw (Google Project Zero) reports a cldflt.sys privilege escalation bug to Microsoft
2020-12-09Microsoft patches it as CVE-2020-17103 in December Patch Tuesday, CVSS 7.8 (NIST)
2025-12A separate flaw in the same cldflt.sys, CVE-2025-62221, is exploited in the wild by unknown threat actors and patched by Microsoft
2026-04Chaotic Eclipse publishes BlueHammer / RedSun / UnDefend in succession
2026-05-12Microsoft May 2026 Patch Tuesday
2026-05-13YellowKey (BitLocker bypass) and GreenPlasma (CTFMON LPE) hit GitHub
2026-05-18The Hacker News and Bleeping Computer report on MiniPlasma; PoC public on GitHub

NVD’s CVE-2020-17103 entry now shows “Last Modified 2026-05-18”, which lines up with the MiniPlasma disclosure and suggests the entry is being reassessed.

What is actually happening inside cldflt.sys

cldflt.sys (Cloud Files Mini Filter Driver) is the filter driver behind “files that live in the cloud but look local,” primarily used by OneDrive.
When a user double-clicks a file whose contents only exist in the cloud, the driver replaces the placeholder (a thin file that holds a reference to the real data rather than the data itself) with the actual content.

The routine in question is HsmOsBlockPlaceholderAccess, which gates access to those placeholders.
There is a race window between the access check and the actual access. An attacker thread that slips into that window can have the SYSTEM context act on attacker-controlled content — that is MiniPlasma’s claim.

The researcher notes that “success rate may vary since it’s a race condition,” so this is the kind of bug that can fail to fire depending on the environment. That said, a full-chain PoC reaching a SYSTEM shell is already on GitHub.

graph TD
    A[Non-privileged user<br/>accesses a file via cldflt] --> B[HsmOsBlockPlaceholderAccess<br/>performs ACL check]
    B --> C[Race window<br/>between check and actual access]
    C --> D[Attacker thread<br/>swaps the placeholder backing file]
    D --> E[SYSTEM context<br/>processes the swapped file]
    E --> F[Arbitrary code execution / SYSTEM shell]

The “works on fully patched Windows 11 May 2026” / “does not work on the latest Insider Preview Canary” observation comes from Will Dormann at Tharros, who reproduced it independently. Will Dormann also verified BlueHammer, YellowKey, and GreenPlasma, and has effectively become the fact-checking anchor for the Chaotic Eclipse series.

The fact that Canary blocks it is a sign that Microsoft has a fix in motion somewhere internally. No new CVE assignment or advisory exists publicly at this point.

The same driver has broken twice in six months

MiniPlasma is not the first recent crack in cldflt.sys.

CVEDisclosedSummaryExploitation
CVE-2020-171032020-12Race in HsmOsBlockPlaceholderAccessWas thought to be patched
CVE-2025-622212025-12Different flaw in the same cldflt.sys, CVSS 7.8Exploited in the wild, unknown threat actors
MiniPlasma2026-05Same routine as CVE-2020-17103, returnedPublic PoC, no known in-the-wild use yet

At the driver level, the last six months have produced a re-emergence of a previously patched bug, in-the-wild exploitation of a second flaw, and a public PoC. cldflt.sys ships in any OneDrive environment, which is the default configuration, so the affected install base is broad.

The CVE-2025-62221 in-the-wild use matters here. It tells us cldflt.sys is already on the radar of APT-grade attackers as a place to land payloads. MiniPlasma isn’t opening a new path into the driver — it’s the December 2020 fix having regressed. That’s the part that should be unsettling.

Where MiniPlasma fits in the Chaotic Eclipse run

MiniPlasma extends the run of Windows zero-days that Chaotic Eclipse (a.k.a. Nightmare-Eclipse) has been publishing since April.

ReleasedBugTargetStatus
2026-04BlueHammerWindows Defender LPECVE-2026-33825, patched in April
2026-04RedSunDefender familyResearcher claims silent patch
2026-04UnDefendDefender familyDetails not public
2026-05-13YellowKeyBitLocker bypassUnpatched
2026-05-13GreenPlasmaCTFMON LPEUnpatched
2026-05-18MiniPlasmacldflt.sys LPEUnpatched (an incomplete-patch story for CVE-2020-17103)

On May 13 the researcher teased a “big surprise” for the June Patch Tuesday cycle. Whether MiniPlasma is that surprise or whether something else is still queued is unclear today.
BlueHammer hit the Cloud Files API + VSS interaction; MiniPlasma hits cldflt.sys directly. Either way, the Cloud Files surface is clearly something the researcher keeps probing.

The frustration around RedSun’s silent patch (closed inside the May update without an advisory or CVE, according to the researcher) is the stated motivation for this run. Microsoft has not responded publicly so far.

Scope and what to actually do

MiniPlasma by itself is a local privilege escalation, not an initial-access vector. It assumes the attacker can already run code as a standard user.

That said, cldflt.sys is resident wherever OneDrive is in play, which is most of the Windows install base.

AngleConcrete action
DetectionCheck whether EDR can catch placeholder access through cldflt.sys followed shortly by a high-privilege process starting up
OneDrive footprintDisable Cloud Files sync on machines that don’t actually need it, or scope it to specific users
Initial-access controlsLPE alone is not enough on its own, so harden the layers that stop phishing- and supply-chain-driven RCEs
Patch Tuesday watchWatch June Patch Tuesday (scheduled 2026-06-09) for a new cldflt.sys CVE. Canary blocking it points to a likely June fix
Insider PreviewIf you can run a non-production Canary build, comparing its behavior here gives you a preview of what June’s release is likely to ship

Placeholder activity under OneDrive is noisy in normal operation, so cldflt.sys telemetry on its own is not a clean signal. Pair it with what follows — lsass access, new SYSTEM-context processes — to make detection actually work.