Skip to main content
Press slash or control plus K to focus the search. Use the arrow keys to navigate results and press enter to open a threat.
Reconnecting to live updates…

Researcher Drops MiniPlasma Windows Exploit for Unpatched 2020 CVE

0
Medium
Exploitwindows
Published: Mon May 18 2026 (05/18/2026, 10:38:22 UTC)
Source: SecurityWeek

Description

The researcher dropped the MiniPlasma exploit that uses the original proof-of-concept (PoC) code targeting the bug. The post Researcher Drops MiniPlasma Windows Exploit for Unpatched 2020 CVE appeared first on SecurityWeek .

AI-Powered Analysis

Machine-generated threat intelligence

AILast updated: 05/18/2026, 10:52:30 UTC

Technical Analysis

CVE-2020-17103 is a privilege escalation vulnerability in the Windows Cloud Filter driver that allows unauthenticated manipulation of registry keys via an undocumented API, enabling attackers to create keys in the DEFAULT user hive without access checks. Google Project Zero reported this flaw in 2020, and Microsoft released patches as part of the December 2020 Patch Tuesday updates. However, a recent exploit named MiniPlasma, released by researcher Chaotic Eclipse, demonstrates that the vulnerability may still be present on some Windows systems, including Windows 11 with recent security updates. The exploit uses the original proof-of-concept code and can spawn a System shell, indicating successful privilege escalation. Independent analysis notes the exploit does not work on the latest Windows 11 Insider Preview Canary builds. Microsoft has not publicly confirmed the current patch status or provided a statement regarding this exploit.

Potential Impact

If unpatched, this vulnerability allows an attacker to escalate privileges on affected Windows systems to SYSTEM level, potentially enabling execution of code with the highest privileges. This could lead to full system compromise. The exploit reportedly works on Windows 11 systems with May 2026 updates installed, indicating that some supported versions may remain vulnerable. There is no confirmed evidence of active exploitation in the wild at this time.

Mitigation Recommendations

Patch status is not yet confirmed — check the vendor advisory for current remediation guidance. Microsoft released patches for CVE-2020-17103 in December 2020; however, the researcher claims these may not have fully resolved the issue or were rolled back. Organizations should verify that the December 2020 Patch Tuesday updates and subsequent security updates are correctly applied. Monitoring official Microsoft advisories for updates or statements regarding this exploit is recommended. No additional mitigation steps are specified by the vendor or researcher at this time.

Pro Console: star threats, build custom feeds, automate alerts via Slack, email & webhooks.Upgrade to Pro

Technical Details

Article Source
{"url":"https://www.securityweek.com/researcher-drops-miniplasma-windows-exploit-for-unpatched-2020-cve/","fetched":true,"fetchedAt":"2026-05-18T10:52:20.637Z","wordCount":955}

Threat ID: 6a0aef67ec166c07b0a72dee

Added to database: 5/18/2026, 10:52:23 AM

Last enriched: 5/18/2026, 10:52:30 AM

Last updated: 5/20/2026, 3:32:08 PM

Views: 60

Community Reviews

0 reviews

Crowdsource mitigation strategies, share intel context, and vote on the most helpful responses. Sign in to add your voice and help keep defenders ahead.

Sort by
Loading community insights…

Want to contribute mitigation steps or threat intel context? Sign in or create an account to join the community discussion.

Actions

PRO

Updates to AI analysis require Pro Console access. Upgrade inside Console → Billing.

Please log in to the Console to use AI analysis features.

Need more coverage?

Upgrade to Pro Console for AI refresh and higher limits.

For incident response and remediation, OffSeq services can help resolve threats faster.

Latest Threats

Breach by OffSeqOFFSEQFRIENDS — 25% OFF

Check if your credentials are on the dark web

Instant breach scanning across billions of leaked records. Free tier available.

Scan now
OffSeq TrainingCredly Certified

Lead Pen Test Professional

Technical5-day eLearningPECB Accredited
View courses