Menu

  • Alerts
  • Incidents
  • News
  • APTs
  • Cyber Decoded
  • Cyber Hygiene
  • Cyber Review
  • Cyber Tips
  • Definitions
  • Malware
  • Threat Actors
  • Tutorials

Useful Tools

  • Password generator
  • Report an incident
  • Report to authorities
No Result
View All Result
CTF Hack Havoc
CyberMaterial
  • Education
    • Cyber Decoded
    • Definitions
  • Information
    • Alerts
    • Incidents
    • News
  • Insights
    • Cyber Hygiene
    • Cyber Review
    • Tips
    • Tutorials
  • Support
    • Contact Us
    • Report an incident
  • About
    • About Us
    • Advertise with us
Get Help
Hall of Hacks
  • Education
    • Cyber Decoded
    • Definitions
  • Information
    • Alerts
    • Incidents
    • News
  • Insights
    • Cyber Hygiene
    • Cyber Review
    • Tips
    • Tutorials
  • Support
    • Contact Us
    • Report an incident
  • About
    • About Us
    • Advertise with us
Get Help
No Result
View All Result
Hall of Hacks
CyberMaterial
No Result
View All Result
Home Alerts

Windows Cloud Files Minifilter Exploited

October 30, 2025
Reading Time: 3 mins read
in Alerts
Windows Cloud Files Minifilter Exploited

The Cloud Files Minifilter drivers a core component of Windows features like **OneDrive’s Files On-Demand**. It allows cloud-stored files to appear as local placeholders that seamlessly “hydrate” (download) when accessed. Sync root directories, registered via the **CfRegisterSyncRoot API**, enforce policies for how these files and directories are presented and downloaded. The driver operates in **kernel mode**, intercepting file operations like creation, reading, and writing to ensure secure integration with the cloud service. This tight coupling between user-space APIs and kernel handling of file creation, specifically through functions like **CfCreatePlaceholders**, is where the risk of input validation errors arises.

The vulnerability, tracked as CVE-2025-55680 (with a CVSS score of 7.8), is rooted in the $HsmpOpCreatePlaceholders$ function within the $cldflt.sys$ driver. This function is triggered when an application attempts to create file placeholders under a sync root. Initially, the function maps the user-supplied filename buffer (called relName) into the kernel space using $IoAllocateMdl$ and $MmMapLockedPagesSpecifyCache$, creating a shared view of the physical memory. The vulnerability is a Time-of-Check to Time-of-Use (TOCTOU) flaw: the driver validates the $relName$ for forbidden characters (such as $’\setminus’$ or $’:’$) but a narrow window of opportunity exists between this check and the final file creation call, $FltCreateFileEx2$.

An attacker with only **low-level privileges** can exploit this TOCTOU weakness by coordinating **multiple threads**. One thread continuously spams the $CfCreatePlaceholders$ API with a benign file payload, while a “racing” thread monitors the shared memory buffer. Just after the kernel validates the $relName$ but before it creates the file, the racing thread quickly alters a single byte in the mapped buffer. For instance, it can change a benign character in a string like “JUSTASTRINGDnewfile.dll” to a backslash, effectively transforming it to **”JUSTASTRING\newfile.dll”**.

An attacker with only low-level privileges can exploit this TOCTOU weakness by coordinating multiple threads. One thread continuously spams the $CfCreatePlaceholders$ API with a benign file payload, while a “racing” thread monitors the shared memory buffer. Just after the kernel validates the $relName$ but before it creates the file, the racing thread quickly alters a single byte in the mapped buffer. For instance, it can change a benign character in a string like “JUSTASTRINGDnewfile.dll” to a backslash, effectively transforming it to “JUSTASTRING\newfile.dll”.

Once the malicious DLL is placed in a directory like $System32$, the attacker can achieve **DLL side-loading** by having a legitimate service or process load their unauthorized code, resulting in **code execution in the kernel context (SYSTEM-level access)**. Discovered in March 2024 by Exodus Intelligence, Microsoft addressed this flaw in the **October 2025 Patch Tuesday updates**. While no widespread in-the-wild exploitation has been confirmed, experts rate its exploitability as “more likely” due to its straightforward nature. Microsoft urges **immediate patching**, and enterprises should also audit OneDrive usage and enforce strict **least-privilege policies** to minimize local threats, underscoring the dangers of kernel flaws that bridge user and system processes.

Reference:

  • Microsoft Windows Cloud Files Minifilter Privilege Escalation Exploited Now Seen
Tags: Cyber AlertsCyber Alerts 2025CyberattackCybersecurityOctober 2025
ADVERTISEMENT

Related Posts

ShadowPad Exploits WSUS Flaw For Access

Windows 11 24H2 Explorer And Start Crash

November 24, 2025
ShadowPad Exploits WSUS Flaw For Access

Matrix Push C2 Uses Browser Alerts To Phish

November 24, 2025
ShadowPad Exploits WSUS Flaw For Access

ShadowPad Exploits WSUS Flaw For Access

November 24, 2025
Salesforce Breach Hits Over 200 Victims

Sturnus Trojan Steals Android Chats

November 21, 2025
Salesforce Breach Hits Over 200 Victims

Tsundere Botnet Grows via Game Lures

November 21, 2025
APT24 Uses BADAUDIO in Taiwan Spying

APT24 Uses BADAUDIO in Taiwan Spying

November 21, 2025

Latest Alerts

Windows 11 24H2 Explorer And Start Crash

Matrix Push C2 Uses Browser Alerts To Phish

ShadowPad Exploits WSUS Flaw For Access

Sturnus Trojan Steals Android Chats

Tsundere Botnet Grows via Game Lures

APT24 Uses BADAUDIO in Taiwan Spying

Subscribe to our newsletter

    Latest Incidents

    Delta Dental Virginia Breach Hits 146000

    Iberia Alerts Customers To Data Breach

    Cox Confirms Oracle Hack As Victims Named

    Over 50000 Asus Routers Compromised

    Salesforce Breach Hits Over 200 Victims

    Almaviva Leak Exposes FS Group Data

    CyberMaterial Logo
    • About Us
    • Contact Us
    • Jobs
    • Legal and Privacy Policy
    • Site Map

    © 2025 | CyberMaterial | All rights reserved

    Welcome Back!

    Login to your account below

    Forgotten Password?

    Retrieve your password

    Please enter your username or email address to reset your password.

    Log In

    Add New Playlist

    No Result
    View All Result
    • Alerts
    • Incidents
    • News
    • Cyber Decoded
    • Cyber Hygiene
    • Cyber Review
    • Definitions
    • Malware
    • Cyber Tips
    • Tutorials
    • Advanced Persistent Threats
    • Threat Actors
    • Report an incident
    • Password Generator
    • About Us
    • Contact Us
    • Advertise with us

    Copyright © 2025 CyberMaterial