CVE-2023-36904

7.8 HIGH

📋 TL;DR

This vulnerability in the Windows Cloud Files Mini Filter Driver allows an authenticated attacker to gain SYSTEM-level privileges by exploiting a buffer overflow condition. It affects Windows systems with the vulnerable driver component. Attackers must already have local access to exploit this privilege escalation flaw.

💻 Affected Systems

Products:
  • Microsoft Windows
Versions: Windows 10, Windows 11, Windows Server 2019, Windows Server 2022
Operating Systems: Windows
Default Config Vulnerable: ⚠️ Yes
Notes: Affects systems with the Cloud Files Mini Filter Driver (cldflt.sys) enabled, which is typically present on systems using OneDrive or other cloud storage sync features.

📦 What is this software?

⚠️ Risk & Real-World Impact

🔴

Worst Case

Complete system compromise with SYSTEM privileges, enabling installation of malware, data theft, persistence mechanisms, and lateral movement across the network.

🟠

Likely Case

Local privilege escalation from a standard user account to SYSTEM, allowing attackers to bypass security controls, install backdoors, or access protected system resources.

🟢

If Mitigated

Limited impact with proper privilege separation, application control policies, and endpoint protection that detects suspicious driver activity.

🌐 Internet-Facing: LOW - Requires local access and authentication; cannot be exploited remotely over the internet.
🏢 Internal Only: HIGH - Significant risk in environments where attackers gain initial foothold through phishing, malware, or compromised user accounts.

🎯 Exploit Status

Public PoC: ✅ No
Weaponized: UNKNOWN
Unauthenticated Exploit: ✅ No
Complexity: MEDIUM

Requires local authenticated access and knowledge of driver exploitation techniques. No public exploit code available as of analysis.

🛠️ Fix & Mitigation

✅ Official Fix

Patch Version: July 2023 security updates (KB5028185 for Windows 10, KB5028182 for Windows 11, etc.)

Vendor Advisory: https://msrc.microsoft.com/update-guide/vulnerability/CVE-2023-36904

Restart Required: Yes

Instructions:

1. Apply July 2023 Windows security updates via Windows Update. 2. For enterprise environments, deploy updates through WSUS, Configuration Manager, or Intune. 3. Restart systems after patch installation.

🔧 Temporary Workarounds

Disable Cloud Files Mini Filter Driver

windows

Temporarily disable the vulnerable driver component if patching is not immediately possible

fltmc unload cldflt

🧯 If You Can't Patch

  • Implement strict application control policies to prevent unauthorized driver loading
  • Enforce principle of least privilege and monitor for privilege escalation attempts

🔍 How to Verify

Check if Vulnerable:

Check if cldflt.sys driver version is prior to July 2023 updates using: Get-WmiObject Win32_PnPSignedDriver | Where-Object {$_.DeviceName -like '*cldflt*'} | Select-Object DeviceName, DriverVersion

Check Version:

systeminfo | findstr /B /C:"OS Name" /C:"OS Version"

Verify Fix Applied:

Verify cldflt.sys driver version is updated post-July 2023 patches and check Windows Update history for KB5028185/KB5028182 installation

📡 Detection & Monitoring

Log Indicators:

  • Event ID 4697: Service installation attempts
  • Suspicious driver loading events in Security logs
  • Privilege escalation patterns in endpoint detection logs

Network Indicators:

  • Unusual outbound connections following local privilege escalation
  • Lateral movement attempts from previously low-privilege accounts

SIEM Query:

source="windows_security" EventID=4697 | where DriverName="cldflt.sys"

🔗 References

📤 Share & Export