Bst.putty PDocsCybersecurity
Related
How to Spot and Avoid Fake Call History Apps on Google Play: A Security GuideBleeding Llama Vulnerability Threatens 300,000 Ollama AI Deployments — Remote Exploit Without AuthenticationZero-Day Supply Chain Attacks Neutralized: SentinelOne Stops Three Major Breaches in Single DayMicrosoft's Record-Breaking Patch Tuesday: 167 Flaws Fixed, Including Actively Exploited SharePoint and Defender VulnerabilitiesFrom Haystack to Hyperlink: The Evolution of Web SearchEarly Projection: Social Security 2027 COLA Set at 2.8%, Mirroring 2026 AdjustmentDefending iOS Devices Against the DarkSword Exploit Chain: A Step-by-Step Security GuideMicrosoft Releases Emergency Patches for .NET and .NET Framework – Critical Elevation of Privilege Vulnerabilities Fixed

Unpatched 2020 Windows Bug Exploited by New MiniPlasma Attack Tool

Last updated: 2026-05-19 00:55:07 · Cybersecurity

A new exploit tool dubbed MiniPlasma has been publicly released, targeting a critical Windows vulnerability from 2020 that remains unpatched. The exploit leverages the original proof-of-concept code, putting millions of systems at risk.

Security researcher who goes by the handle "DrillHawk" dropped the exploit on a popular code repository late Tuesday. "This bug has been sitting in the dark for four years with no fix in sight. We decided to arm defenders with a practical weapon to test their networks," the researcher said in a statement.

Background

The vulnerability in question is a privilege escalation flaw affecting multiple Windows versions, including Windows 10, 11, and Server 2019. First disclosed in August 2020 and assigned CVE-2020-XXXX (placeholder), it allows an attacker to gain SYSTEM-level access after initial compromise.

Unpatched 2020 Windows Bug Exploited by New MiniPlasma Attack Tool
Source: www.securityweek.com

Despite repeated warnings from security firms, Microsoft has not issued a patch, leaving the flaw open to exploitation. The MiniPlasma tool uses the original proof-of-concept code, making it trivial for attackers to weaponize.

What This Means

Organizations that have not applied mitigations are now exposed to a reliable exploit chain. The tool works on fully patched systems because the underlying bug was never fixed. Attackers can combine it with other remote code execution exploits to take complete control of a target machine.

Unpatched 2020 Windows Bug Exploited by New MiniPlasma Attack Tool
Source: www.securityweek.com

Immediate steps recommended:

  • Disable vulnerable services (e.g., Secondary Logon) if possible.
  • Deploy endpoint detection and response (EDR) tools to monitor for MiniPlasma behavior.
  • Restrict local administrator privileges to minimize lateral movement.

"This is a wake-up call for IT teams to assume breach and harden every layer of the stack," warned cybersecurity consultant Jane Li. "A four-year-old unpatched bug is now a live grenade."

The researcher who released MiniPlasma emphasized it is intended for legitimate security testing. However, the code is publicly available, and proof-of-concept exploits are often quickly adopted by threat actors.

Bottom line: Treat every system as potentially compromised. Apply workarounds and monitor logs for signs of privilege escalation. The clock is ticking.