CVE-2023-29361
📋 TL;DR
This vulnerability in the Windows Cloud Files Mini Filter Driver allows an attacker to gain SYSTEM-level privileges on affected Windows systems. It affects Windows 10, 11, and Server versions where the Cloud Files feature is enabled. An attacker must already have local access to exploit this vulnerability.
💻 Affected Systems
- Windows 10
- Windows 11
- Windows Server 2019
- Windows Server 2022
📦 What is this software?
Windows 10 21h2 by Microsoft
Windows 10 22h2 by Microsoft
Windows 11 21h2 by Microsoft
Windows 11 22h2 by Microsoft
⚠️ Risk & Real-World Impact
Worst Case
Complete system compromise with SYSTEM privileges, enabling installation of malware, data theft, and persistence mechanisms.
Likely Case
Local privilege escalation from a standard user or low-privileged account to SYSTEM, allowing lateral movement and persistence.
If Mitigated
Limited impact if proper patch management and least privilege principles are enforced, though local attackers could still escalate privileges.
🎯 Exploit Status
Requires local access and some technical knowledge; no public exploit code available as of knowledge cutoff.
🛠️ Fix & Mitigation
✅ Official Fix
Patch Version: May 2023 security updates (KB5026361 for Windows 10, KB5026372 for Windows 11, etc.)
Vendor Advisory: https://msrc.microsoft.com/update-guide/vulnerability/CVE-2023-29361
Restart Required: Yes
Instructions:
1. Apply May 2023 Windows security updates via Windows Update. 2. For enterprise: Deploy updates through WSUS or SCCM. 3. Verify installation via winver or systeminfo.
🔧 Temporary Workarounds
Disable Cloud Files Mini Filter Driver
windowsTemporarily disable the vulnerable driver if patching isn't immediately possible
fltmc unload cldflt
🧯 If You Can't Patch
- Implement strict least privilege access controls to limit local user accounts
- Monitor for suspicious privilege escalation attempts using EDR/SIEM tools
🔍 How to Verify
Check if Vulnerable:
Check if May 2023 security updates are installed via 'systeminfo' or Windows Update history
Check Version:
systeminfo | findstr /B /C:"OS Name" /C:"OS Version"
Verify Fix Applied:
Verify KB5026361 (Win10) or KB5026372 (Win11) is installed and system has been restarted
📡 Detection & Monitoring
Log Indicators:
- Event ID 4697: Service installation attempts
- Suspicious driver loading events
- Privilege escalation patterns
Network Indicators:
- Not applicable - local exploit only
SIEM Query:
EventID=4697 AND (ServiceFileName="*cldflt*" OR ServiceName="Cloud Files Filter Driver")