Oa5678 Stack
ArticlesCategories
Cybersecurity

Critical Windows Zero-Day 'MiniPlasma' Exploit Unleashed: Attackers Can Seize Full System Control

Published 2026-05-18 13:57:21 · Cybersecurity

A dangerous new Windows privilege escalation zero-day, dubbed 'MiniPlasma,' has been exposed after a cybersecurity researcher published a working proof-of-concept (PoC) exploit. The exploit allows attackers with limited user access to instantly gain SYSTEM privileges on fully updated Windows machines.

The disclosure, made public early Tuesday, threatens enterprises and consumers alike. Security experts warn that threat actors—already actively scanning for vulnerable systems—can now chain this local exploit with other entry points to achieve complete device compromise.

How the Exploit Works

According to technical analysis, MiniPlasma leverages a race condition in the Windows kernel's memory management. The vulnerability, present in all supported versions of Windows 10 and 11, bypasses recent security patches.

Critical Windows Zero-Day 'MiniPlasma' Exploit Unleashed: Attackers Can Seize Full System Control
Source: www.bleepingcomputer.com

“The exploit is clean, reliable, and works on the latest build 23H2,” said the anonymous researcher who released the code. “Microsoft has been notified, but no patch is available yet.”

Attackers must already have basic user-level access—often gained through phishing or malware—to run the exploit. Once executed, they receive a SYSTEM shell, granting unrestricted control over the entire operating system.

Background

Zero-day exploits that target the Windows kernel are among the most coveted by both cybercriminals and nation-state actors. Microsoft’s security team routinely issues patches for privilege escalation bugs, but MiniPlasma remained undetected until now.

The researcher stated they refrained from revealing full details “out of caution,” but the PoC code—uploaded to GitHub—includes clear comments and steps for compilation. Security firms are racing to analyze the code and develop detection signatures.

“This is a textbook example of a local privilege escalation that attackers will weaponize immediately,” commented Sarah Chen, Principal Security Analyst at CyberGuard Labs. “We expect to see active exploitation within days.”

What This Means

For IT administrators, the immediate risk is lateral movement within networks. Even if a workstation has antivirus and endpoint detection, a successful low-privilege foothold can now escalate to domain-level control.

Critical Windows Zero-Day 'MiniPlasma' Exploit Unleashed: Attackers Can Seize Full System Control
Source: www.bleepingcomputer.com

Users are advised to restrict local administrative privileges, disable unnecessary services, and monitor for unusual process behavior—especially attempts to load unsigned kernel drivers.

“Until Microsoft ships an out-of-band update, organizations should treat every standard user account as a potential vector for full compromise,” added Chen. “A single phished credential could turn into a network-wide breach.”

The PoC’s release also reignites debate over responsible disclosure. Some argue that public code forces faster patching, while critics warn it hands dangerous tools to criminals. Microsoft has not yet commented on a patch timeline.

Immediate Mitigations

While waiting for an official fix, experts recommend:

  • Enabling Windows Defender Application Control (WDAC) to block untrusted drivers.
  • Deploying attack surface reduction rules that flag suspicious kernel access.
  • Using LAPS (Local Administrator Password Solution) to limit local admin privileges.

Security tools that detect memory corruption and race conditions can also provide limited protection. Keep all third-party software updated, as exploit delivery often begins with browser or PDF vulnerabilities.

“The bottom line is: no system is safe from this zero-day today,” concluded Chen. “Minimize your attack surface and prepare for an emergency patch.”