Code Defence Cyber security

MiniPlasma Windows zero-day exploit bypasses May patches to yield local SYSTEM shells

An unpatched local privilege escalation vulnerability has been verified as operational on fully updated endpoint workstations, bypassing modern platform isolation mechanisms. The release of a functional exploit framework lowers the barrier for automated post-exploitation tooling to claim high-privilege access.

The vulnerability, codenamed MiniPlasma, resides in the Windows Cloud Files Mini Filter Driver filesystem component. Forensic testing confirms that the flaw leverages a race condition within an internal asset access verification routine that allows a local non-privileged process to reliably elevate to a SYSTEM authority command terminal. Although related structural bugs in this component were addressed under legacy updates, the exact execution path is confirmed as functional against fully updated installations running the May 2026 cumulative package.

Local privilege escalation tools are vital components of modern network compromise strategies. Once initial user-level access is gained via social engineering or web exploits, an adversary can run a local race-condition payload to achieve kernel-level control, enabling the silent disabling of endpoint protection configurations and harvesting domain secrets.

– Review EDR behavior metrics for unverified processes attempting to interact with cloud filter driver routines.

– Restrict local non-privileged binary execution parameters through application control policies to stop untrusted tools from running.

– Audit local administrative groups and access privileges to flag anomalous script execution environments.

– Prepare deployment loops for accelerated operating system updates as vendor coordination progresses.

Endpoint defense requires applying robust application constraint policies to prevent local non-privileged processes from running system level manipulation routines. #CodeDefence #Microsoft #Windows #ZeroDay #PrivilegeEscalation
/

Scroll to Top