Red Hot Cyber
Cybersecurity is about sharing. Recognize the risk, combat it, share your experiences, and encourage others to do better than you.
Cybersecurity is about sharing. Recognize the risk,
combat it, share your experiences, and encourage others
to do better than you.
HackTheBox 320x100 1
2nd Edition GlitchZone RHC 970x120 2
Windows Cloud Files Mini Filter Vulnerability Under Active Exploitation

Windows Cloud Files Mini Filter Vulnerability Under Active Exploitation

10 December 2025 10:22

A zero-day vulnerability in the Windows Cloud Files Mini Filter driver (cldflt.sys) is currently being actively exploited. Microsoft has released urgent security updates to address this vulnerability.

The vulnerability is classified as high, according to the CVSS v3.1 base score of 7.8; furthermore, according to the advisory released by Microsoft, it appears that attackers are using working exploits on the machines in order to gain SYSTEM privileges.

A wide range of Windows operating systems, from the latest versions of Windows 11, such as 25H2, and Windows Server 2025, up to Windows 10 version 1809, are affected by this privilege escalation (PLE) vulnerability.

The vulnerability is described as a Use-After-Free weakness within the Cloud Files Mini Filter Driver, a kernel component responsible for managing “placeholders” and synchronization for cloud storage services like OneDrive.

Unlike remote code execution (RCE) flaws, this vulnerability is exploited as a secondary step in attack chains, where adversaries have already gained a foothold in the system and attempt to escalate their privileges to persist or disable security controls.

The flaw allows a locally authenticated, low-privileged attacker to trigger a memory corruption state, allowing them to subsequently execute arbitrary code with higher system privileges.

The Microsoft Threat Intelligence Center (MSTIC) and Microsoft Security Response Center (MSRC) identified the bug, noting that while the complexity of the attack is low and requires no user interaction, the attacker must have established local access to the target computer.

Administrators should prioritize patching these systems immediately, given the confirmed state of active exploitation.

Follow us on Google News to receive daily updates on cybersecurity. Contact us if you would like to report news, insights or content for publication.

  • cloud storage security
  • CVE-2025-62221
  • cybersecurity threats
  • Microsoft security updates
  • privilege escalation
  • threat intelligence
  • vulnerability management
  • Windows Cloud Files Mini Filter vulnerability
  • Windows security patches
  • zero-day exploit
Cropped RHC 3d Transp2 1766828557 300x300
The editorial staff of Red Hot Cyber is composed of IT and cybersecurity professionals, supported by a network of qualified sources who also operate confidentially. The team works daily to analyze, verify, and publish news, insights, and reports on cybersecurity, technology, and digital threats, with a particular focus on the accuracy of information and the protection of sources. The information published is derived from direct research, field experience, and exclusive contributions from national and international operational contexts.