New Windows 'MiniPlasma' Zero-Day Exploit Gives SYSTEM Access, PoC Released (bleepingcomputer.com) 14
A researcher known as Chaotic Eclipse has released a proof-of-concept exploit for a new Windows zero-day dubbed MiniPlasma, which BleepingComputer confirmed can grant SYSTEM privileges on fully patched Windows 11 systems. The researcher claims the bug is effectively a still-exploitable version of a 2020 flaw Microsoft said it had fixed. From the report: At the time, the flaw was assigned the CVE-2020-17103 identifier and reportedly fixed in December 2020. "After investigating, it turns out the exact same issue that was reported to Microsoft by Google project zero is actually still present, unpatched," explains Chaotic Eclipse. "I'm unsure if Microsoft just never patched the issue or the patch was silently rolled back at some point for unknown reasons. The original PoC by Google worked without any changes."
BleepingComputer tested the exploit on a fully patched Windows 11 Pro system running the latest May 2026 Patch Tuesday updates. In our test, we used a standard user account, and after running the exploit, it opened a command prompt with SYSTEM privileges, as shown in the image [here]. Will Dormann, principal vulnerability analyst at Tharros, also confirmed the exploit works in his tests on the latest public version of Windows 11. However, he said that the flaw does not work in the latest Windows 11 Insider Preview Canary build.
The exploit appears to abuse how the Windows Cloud Filter driver handles registry key creation through an undocumented CfAbortHydration API. Forshaw's original report said that the flaw could allow arbitrary registry keys to be created in the .DEFAULT user hive without proper access checks, potentially enabling privilege escalation. While Microsoft reports having fixed the bug as part of its December 2020 Microsoft Patch Tuesday, Chaotic Eclipse now claims the vulnerability can still be exploited.
BleepingComputer tested the exploit on a fully patched Windows 11 Pro system running the latest May 2026 Patch Tuesday updates. In our test, we used a standard user account, and after running the exploit, it opened a command prompt with SYSTEM privileges, as shown in the image [here]. Will Dormann, principal vulnerability analyst at Tharros, also confirmed the exploit works in his tests on the latest public version of Windows 11. However, he said that the flaw does not work in the latest Windows 11 Insider Preview Canary build.
The exploit appears to abuse how the Windows Cloud Filter driver handles registry key creation through an undocumented CfAbortHydration API. Forshaw's original report said that the flaw could allow arbitrary registry keys to be created in the .DEFAULT user hive without proper access checks, potentially enabling privilege escalation. While Microsoft reports having fixed the bug as part of its December 2020 Microsoft Patch Tuesday, Chaotic Eclipse now claims the vulnerability can still be exploited.
Untrustworthy is an Understatement (Score:3)
It's hard to prove that Microsoft cares less about security than other vendors, without a bunch of information from Microsoft and other vendors that we're not privy to — not even shareholders get to know the full risks involved in the products upon which their dividends depend. But it's easy to prove that they will happily lie about it.
Re: (Score:2)
The Linux kernel has had multiple major vulns lately. I don't think you can put it down to Microsoft not caring about security so much as it's a hard job and getting harder with every line of bloat Microsoft adds.
I'm curious if anyone's found an OpenBSD vulnerability lately?
Well, at least there haven't been any Linux 0 days (Score:2)
Point me to the Linux RCE, again? (Score:2)
My other observation is "Hey tough guys, where's the RCE bugs in OpenSSH?" Almost as if others have already been the shit out of them with static analysis tools and b
Re: (Score:2)
Re: (Score:2)
On Linux, there's at least an expectation that someone will try and fix the zero days after they're are discovered.
On Windows there's zero-days that've been published six years ago and just work with the then attached guide.
Re: (Score:2)
Re: (Score:2)
Re: (Score:2)
win 11 source (Score:2)
The only thing that can rescue Windows security is releasing the source code.
Re: (Score:2)
Sorry, but two of the biggest stories in IT over the past few weeks are privilege escalations attacks within the Linux kernel such as Copy Fail and Dirty Frag. While it may be true that over the previous 25 years being open source has helped protect Linux, the surge in high quality AI analysis tools has HURT Linux in the past few months.
Open source != super secure, and the past few weeks have proven that.
Right now, I think it's fair to say that the weapons of offense are greater than the weapons of defens
Re: (Score:2)
At this point, there is probably nothing that can rescue either Microsoft or Linux from the hordes at the wall. Both are performance-first operating systems. There's nothing surprising or unusual about that; this is the dominant paradigm. Windows NT made at least some attempt in the other direction until version 4, but then they prioritized UI latency over memory security. LLMs apparently don't have to be able to think to recognize patterns which indicate vulnerabilities. If having closed source is even sti
Re: (Score:2)