CVE-2020-17103: Local Privilege Escalation in Windows Cloud Files Mini Filter Driver
Vulnerability ID: CVE-2020-17103
CVSS Score: 7.0
Published: 2020-12-09
CVE-2020-17103 is a local privilege escalation vulnerability located in the Windows Cloud Files Mini Filter Driver (cldflt.sys). An exploitable race condition during the handling of impersonation tokens allows a standard local user to write arbitrary data to the .DEFAULT registry hive, leading to SYSTEM-level code execution.
TL;DR
A race condition in the Windows Cloud Files Mini Filter driver allows local attackers to elevate privileges to SYSTEM by abusing registry handle fallbacks during impersonation token toggling.
⚠️ Exploit Status: WEAPONIZED
Technical Details
- CWE ID: CWE-362
- Attack Vector: Local
- CVSS v3.1: 7.0 (High)
- EPSS Score: 0.35%
- Impact: Arbitrary Code Execution as SYSTEM
- Exploit Status: Weaponized
- KEV Status: Not Listed
Affected Systems
- Windows 10 Version 1803
- Windows 10 Version 1809
- Windows 10 Version 1903
- Windows 10 Version 1909
- Windows 10 Version 2004
- Windows 10 Version 20H2
- Windows Server 2004
- Windows Server 20H2
- Windows Server 2016
- Windows Server 2019
- Windows Server Core 1903
- Windows Server Core 1909
- Windows 10: 1803 - 20H2
- Windows Server: 2016 - 2019
- Windows Server Core: 1903 - 1909
Exploit Details
- GitHub (MiniPlasma): Functional Local Privilege Escalation exploit implementing the race condition against HsmOsBlockPlaceholderAccess.
Mitigation Strategies
- Apply Microsoft Security Updates released in and after December 2020
- Validate patching status for regressions reported in May 2026
- Disable the cldflt service if Cloud Files functionality is unused
Remediation Steps:
- Identify all endpoints running Windows 10 (1803-20H2) and Windows Server (2016-2019).
- Deploy the latest Cumulative Updates to all identified systems via SCCM, WSUS, or Intune.
- Monitor patch compliance and restart endpoints to apply kernel modifications.
- If patching cannot be performed, test disabling the 'cldflt' service and ensure business processes do not rely on OneDrive placeholders.
References
- MSRC Advisory CVE-2020-17103
- Project Zero Bug Report
- Project Zero Technical Blog
- MiniPlasma Exploit Repository
Read the full report for CVE-2020-17103 on our website for more details including interactive diagrams and full exploit analysis.
Top comments (0)