CVE-2022-35757

7.3 HIGH

📋 TL;DR

This vulnerability in the Windows Cloud Files Mini Filter Driver allows attackers to gain SYSTEM-level privileges on affected Windows systems. It affects Windows 10, 11, and Server versions where the driver is present. Successful exploitation requires an attacker to already have local access to the system.

💻 Affected Systems

Products:
  • Windows 10
  • Windows 11
  • Windows Server 2016
  • Windows Server 2019
  • Windows Server 2022
Versions: Various versions prior to August 2022 security updates
Operating Systems: Windows
Default Config Vulnerable: ⚠️ Yes
Notes: Affects systems with the Cloud Files Mini Filter Driver (cldflt.sys) enabled, which is typically present on systems using OneDrive or other cloud storage integration.

📦 What is this software?

⚠️ Risk & Real-World Impact

🔴

Worst Case

Complete system compromise with SYSTEM privileges, enabling installation of malware, data theft, lateral movement, and persistence mechanisms.

🟠

Likely Case

Local privilege escalation from a standard user account to SYSTEM, allowing attackers to bypass security controls and execute arbitrary code.

🟢

If Mitigated

Limited impact with proper patch management and endpoint protection that detects privilege escalation attempts.

🌐 Internet-Facing: LOW - This is a local privilege escalation vulnerability requiring initial access to the system.
🏢 Internal Only: HIGH - Once an attacker gains initial access to a system (via phishing, compromised credentials, etc.), they can exploit this to gain full control.

🎯 Exploit Status

Public PoC: ⚠️ Yes
Weaponized: LIKELY
Unauthenticated Exploit: ✅ No
Complexity: LOW

Exploitation requires local access and standard user privileges. The vulnerability is in a driver component, making exploitation relatively straightforward for attackers with local access.

🛠️ Fix & Mitigation

✅ Official Fix

Patch Version: August 2022 security updates (KB5016616 for Windows 10, KB5016623 for Windows 11, etc.)

Vendor Advisory: https://msrc.microsoft.com/update-guide/vulnerability/CVE-2022-35757

Restart Required: Yes

Instructions:

1. Apply August 2022 Windows security updates from Windows Update. 2. For enterprise environments, deploy updates via WSUS, SCCM, or Intune. 3. Restart systems after patch installation.

🔧 Temporary Workarounds

Disable Cloud Files Mini Filter Driver

windows

Temporarily disable the vulnerable driver to prevent exploitation

fltmc unload cldflt
sc config cldflt start= disabled

🧯 If You Can't Patch

  • Implement strict endpoint detection and response (EDR) to monitor for privilege escalation attempts
  • Restrict local administrative privileges and implement least privilege access controls

🔍 How to Verify

Check if Vulnerable:

Check if the system has the vulnerable cldflt.sys driver version. Use: Get-ItemProperty -Path 'HKLM:\SYSTEM\CurrentControlSet\Services\cldflt' -Name ImagePath

Check Version:

systeminfo | findstr /B /C:"OS Name" /C:"OS Version"

Verify Fix Applied:

Verify August 2022 security updates are installed: wmic qfe list | findstr "50166" or check System Information for update KB numbers

📡 Detection & Monitoring

Log Indicators:

  • Event ID 4697 (Service Installation) for cldflt.sys
  • Unexpected privilege escalation events
  • Suspicious driver loading

Network Indicators:

  • Not applicable - local vulnerability

SIEM Query:

EventID=4697 AND ServiceFileName="*cldflt*" OR ProcessName="*cldflt*"

🔗 References

📤 Share & Export