Researcher Drops MiniPlasma Windows Exploit for Unpatched 2020 CVE

https://www.securityweek.com/wp-content/uploads/2023/01/Cybersecurity_News-SecurityWeek.jpg

A security researcher has released an exploit targeting a Windows vulnerability disclosed in 2020, warning that it might have never been patched.

The flaw, tracked as CVE-2020-17103 (CVSS score of 7.0), is described as a privilege escalation issue in the Windows Cloud Filter driver.

Google Project Zero’s researchers reported the weakness in 2020, and Microsoft rolled out fixes for it as part of its December 2020 Patch Tuesday updates.

Per Project Zero’s report on CVE-2020-17103, the vulnerable Windows Cloud Filter driver allows registry key manipulation via an undocumented API.

An attacker could use an unauthenticated network session to create a key in the DEFAULT user hive without access checks, enabling privilege escalation and potentially leading to system code execution, the report reads.

Now, a cybersecurity researcher known as Chaotic Eclipse and Nightmare Eclipse has released MiniPlasma, an exploit that targets the security defect to spawn a System shell.

Advertisement....

Copyright of this story solely belongs to securityweek.com. To see the full text click HERE

Read more