<img height="1" width="1" style="display: none" alt="" src="https://px.ads.linkedin.com/collect/?pid=1098858&amp;fmt=gif">

Critical Windows 'MiniPlasma' Zero-Day Grants SYSTEM Access

"MiniPlasma" Windows vulnerability exposes systems to SYSTEM-level attacks via Cloud Filter driver, posing immediate threat until patched.
Content Team

A dangerous Windows privilege escalation vulnerability called "MiniPlasma" has surfaced with public exploit code available on GitHub. Security researcher Nightmare-Eclipse released the weaponized exploit on May 13, 2026, claiming Microsoft failed to properly fix a bug originally reported by Google Project Zero in 2020.

The flaw targets Windows' Cloud Filter driver and affects all Windows versions. Attackers can exploit it from standard user accounts to gain SYSTEM-level privileges on fully patched systems. The vulnerability manipulates registry key creation through a race condition, bypassing normal access restrictions.

The exploit's GitHub repository gained over 390 stars within days, highlighting serious security community concern. Since the Cloud Filter driver handles OneDrive and other cloud storage services, the vulnerable code runs on most Windows installations. Organizations face immediate risk until Microsoft releases patches.

Source: Cybersecurity News

Share this article
Share on facebook Share on linkedin Share on twitter Share on email
blog_book_a_demo_cta_3x
Have questions about protecting your software?
Our escrow experts are standing by to help.
Book a free demo