CVE-2023-29361 Overview
CVE-2023-29361 is a Use After Free (UAF) vulnerability in the Windows Cloud Files Mini Filter Driver (cldflt.sys) that allows local attackers to escalate privileges on affected Windows systems. The Cloud Files Mini Filter Driver is a kernel-mode component responsible for handling cloud file operations, including synchronization between local files and cloud storage providers like OneDrive.
This vulnerability enables an authenticated attacker with local access to execute arbitrary code with elevated SYSTEM privileges by exploiting a memory corruption condition in the driver. The attack requires winning a race condition, making exploitation more complex but still achievable by skilled attackers.
Critical Impact
Successful exploitation grants SYSTEM-level privileges, allowing complete compromise of the affected Windows system including access to sensitive data, installation of malware, and lateral movement capabilities.
Affected Products
- Microsoft Windows 10 21H2
- Microsoft Windows 10 22H2
- Microsoft Windows 11 21H2
- Microsoft Windows 11 22H2
- Microsoft Windows Server 2022
Discovery Timeline
- 2023-06-14 - CVE-2023-29361 published to NVD
- 2025-04-08 - Last updated in NVD database
Technical Details for CVE-2023-29361
Vulnerability Analysis
The vulnerability exists within the Windows Cloud Files Mini Filter Driver (cldflt.sys), a critical kernel-mode component that facilitates cloud file synchronization operations. The driver contains a Use After Free (CWE-416) memory corruption vulnerability that can be triggered through local access.
Mini filter drivers operate at the kernel level to intercept file system operations, and this particular driver handles the complex task of managing placeholder files and cloud hydration states. The vulnerability arises from improper memory management during the processing of certain file operations, where a memory object is referenced after it has been freed.
The attack complexity is elevated due to the requirement of winning a race condition. An attacker must carefully time their exploitation attempts to access the freed memory before it is reallocated or overwritten. Despite this complexity, successful exploitation results in code execution within the kernel context, effectively granting SYSTEM-level privileges.
Root Cause
The root cause of CVE-2023-29361 is a Use After Free (UAF) condition in the cldflt.sys driver. This occurs when the driver frees a memory object but retains a reference to that memory location. When the driver subsequently attempts to use this dangling pointer, it accesses memory that may have been reallocated for a different purpose. An attacker can manipulate the heap state to control the contents of this reallocated memory, enabling arbitrary code execution in kernel mode.
The vulnerability is categorized under CWE-416 (Use After Free), a class of memory safety issues that frequently leads to privilege escalation when present in kernel-mode drivers.
Attack Vector
The attack vector for CVE-2023-29361 is local, requiring the attacker to have authenticated access to the target system with low privileges. The exploitation scenario typically involves:
- The attacker creates a malicious application or script that interacts with the Cloud Files Mini Filter Driver through file system operations
- The attacker triggers the vulnerable code path that leads to the UAF condition
- Using heap manipulation techniques, the attacker positions controlled data in the freed memory region
- When the driver accesses the dangling pointer, it operates on attacker-controlled data
- Through careful crafting of this data, the attacker hijacks execution flow to escalate privileges to SYSTEM
The vulnerability requires no user interaction and operates entirely within the local system context. While the high attack complexity (race condition) provides some mitigation, determined attackers with sufficient time can reliably achieve exploitation.
Detection Methods for CVE-2023-29361
Indicators of Compromise
- Unusual process spawning from cldflt.sys or cloud file-related services with elevated privileges
- Suspicious memory allocation patterns associated with the Cloud Files Mini Filter Driver
- Unexpected SYSTEM-level processes originating from low-privileged user sessions
- Crash dumps or kernel mode exceptions referencing cldflt.sys
Detection Strategies
- Monitor for suspicious interactions with the Cloud Files Mini Filter Driver through Event Tracing for Windows (ETW)
- Deploy endpoint detection and response (EDR) solutions capable of detecting kernel-mode exploitation attempts
- Implement behavioral analysis to identify privilege escalation patterns following file system operations
- Use Windows Defender Exploit Guard to monitor for abnormal system call patterns
Monitoring Recommendations
- Enable Windows Security event logging for process creation events (Event ID 4688) with command line auditing
- Configure auditing for kernel driver load events and monitor for unusual driver activity
- Implement SentinelOne Singularity platform for real-time behavioral detection of exploitation attempts
- Monitor for abnormal access patterns to cloud storage placeholder files
How to Mitigate CVE-2023-29361
Immediate Actions Required
- Apply Microsoft's June 2023 security updates immediately on all affected Windows systems
- Prioritize patching Windows Server 2022 systems due to their critical infrastructure role
- Review systems for indicators of compromise before and after patching
- Implement network segmentation to limit lateral movement if exploitation has occurred
Patch Information
Microsoft has released security updates addressing CVE-2023-29361 as part of the June 2023 Patch Tuesday release. The patches update the cldflt.sys driver to properly manage memory objects and eliminate the Use After Free condition.
Detailed patch information is available in the Microsoft Security Update Guide for CVE-2023-29361.
Administrators should apply patches through Windows Update, Windows Server Update Services (WSUS), or Microsoft Endpoint Configuration Manager depending on their enterprise deployment model.
Workarounds
- If patching is not immediately possible, consider disabling cloud file synchronization features where not required for business operations
- Restrict local access to critical systems to reduce the attack surface for local privilege escalation
- Implement application whitelisting to prevent unauthorized executables from running
- Deploy SentinelOne behavioral AI to detect and block exploitation attempts in real-time
# Verify patch installation status
wmic qfe list brief | findstr "KB5027215 KB5027231"
# Check cldflt.sys driver version (run as Administrator)
driverquery /v | findstr "cldflt"
Disclaimer: This content was generated using AI. While we strive for accuracy, please verify critical information with official sources.


