Categories: Cyber Security News

Critical Windows Cloud Minifilter Flaw Enables Local Privilege Escalation

A critical security flaw in Microsoft Windows Cloud Minifilter has been fixed, addressing a dangerous race condition that enabled attackers to gain elevated system privileges and write files to any location on affected systems.

The vulnerability, identified as CVE-2025-55680, was discovered by security researchers at Exodus Intelligence in March 2024 and subsequently patched by Microsoft in their October 2025 security updates.

This flaw represents a serious threat to Windows systems running cloud synchronization services.

Race Condition Enables Unrestricted File Creation

The security weakness exists within the Windows Cloud Minifilter driver, known as cldflt.sys, which provides essential file system capabilities for cloud-based applications such as OneDrive.

The vulnerability specifically affects the HsmpOpCreatePlaceholders() function during the processing of requests to create placeholder files in synchronized directories.

Placeholder files serve as special markers used by cloud sync services that automatically retrieve content from cloud storage when users access them.

The problem arises from inadequate validation of filenames during the placeholder creation process.

When users request placeholder file creation, the system performs security checks to verify whether filenames contain prohibited characters like backslashes or colons.

However, researchers identified a critical timing gap between filename validation and actual file creation.

Attackers can exploit this narrow time window by modifying the filename in memory, effectively bypassing security controls.

Attackers can take advantage of this time-of-check time-of-use weakness by running multiple execution threads simultaneously.

Some threads continuously request placeholder creation with legitimate-looking filenames, while other threads rapidly alter characters in the filename buffer.

With precise timing, the malicious filename modification happens after validation completes but before file creation executes, permitting attackers to create files in restricted system directories like C:WindowsSystem32.

By placing malicious DLL files in protected system folders, attackers can exploit DLL side-loading techniques to run arbitrary code with SYSTEM-level privileges.

This attack method requires only basic user privileges initially, making it especially concerning for multi-user systems.

The vulnerability impacts how the Cloud Files Minifilter driver handles the CfCreatePlaceholders() API function, which cloud sync providers use to generate placeholder files representing cloud-stored data.

The driver processes these requests through I/O control code 0x903BC with specific parameters for placeholder operations.

Security experts note this vulnerability relates to an earlier security issue, CVE-2020-17136, which Microsoft patched by implementing filename validation checks.

Unfortunately, these validation checks contained the race condition weakness that created CVE-2025-55680.

System administrators must ensure Windows systems receive the October 2025 security updates immediately to prevent exploitation.

Organizations utilizing cloud synchronization services should prioritize patching systems with configured sync root directories, as these represent necessary conditions for successful attacks.

CVE ID Vulnerability Type Affected Component CVSS 3.1 Score Impact
CVE-2025-55680 Race Condition / Time-of-Check Time-of-Use (TOCTOU) Microsoft Windows Cloud Minifilter (cldflt.sys) 7.8 (High) Privilege Escalation – Arbitrary file creation leading to SYSTEM privileges

Cyber Awareness Month Offer: Upskill With 100+ Premium Cybersecurity Courses From EHA's Diamond Membership: Join Today

The post Critical Windows Cloud Minifilter Flaw Enables Local Privilege Escalation appeared first on Cyber Security News.

rssfeeds-admin

Recent Posts

How Threat Intelligence Helps SOC Teams Cut MTTR and Outpace Modern Attacks

Reducing Mean Time to Respond (MTTR) remains one of the most persistent operational challenges for…

13 seconds ago

Renew Your Wardrobe with These Spring Deals at Men’s Wearhouse

It's not every day that you need to shop for formal wear, but when it's…

14 minutes ago

Gh0st RAT and CloverPlus Adware Delivered Together in New Dual-Payload Malware Campaign

A newly identified malware campaign is raising serious concerns across the cybersecurity community by delivering…

20 minutes ago

Gh0st RAT and CloverPlus Adware Delivered Together in New Dual-Payload Malware Campaign

A newly identified malware campaign is raising serious concerns across the cybersecurity community by delivering…

20 minutes ago

Hackers Use AppDomain Hijacking to Turn Trusted Intel Utility Into Malware Launcher

Security researchers have uncovered a highly sophisticated attack campaign that weaponizes a legitimate, digitally signed…

20 minutes ago

Hackers Use AppDomain Hijacking to Turn Trusted Intel Utility Into Malware Launcher

Security researchers have uncovered a highly sophisticated attack campaign that weaponizes a legitimate, digitally signed…

20 minutes ago

This website uses cookies.