Researchers demonstrate a new False File Immutability (FFI) exploit, Redux, that leverages the Windows Cloud Files driver (cldflt.sys) and FltWriteFileEx to modify in-use executables and achieve kernel-level code execution without requiring SMB/network redirectors. The technique bypasses prior mitigations (and remains effective on some patched Windows versions), and proof-of-concept exploits and mitigations (including an Elastic Defend rule and a filesystem minifilter) were released. #FalseFileImmutability #PPLFault
Keypoints
- New exploit variant βReduxβ abuses the built-in Cloud Files capability (cldflt.sys/CfExecute) to rehydrate and overwrite files that Windows assumes are immutable, enabling kernel-level exploitation without SMB redirectors.
- Experiments show IoCreateFileEx(IO_IGNORE_SHARE_ACCESS_CHECK) and FltWriteFileEx can be used by kernel components to open or write to files that are not opened for FILE_WRITE_DATA, undermining Windows sharing and immutability assumptions.
- Differences between client and server FCB semantics (SMB) explain earlier network-based FFI exploits; Redux demonstrates the same impact can be achieved purely via Cloud Files interactions on the local system.
- Authors implemented four experiments (ExperimentOneβFour) to prove behavior: IO_IGNORE_SHARE_ACCESS_CHECK opening denied files, SEC_IMAGE protections blocking local writes, SMB/server-side bypass, and FltWriteFileEx writing to non-writable FILE_OBJECTs.
- Redux and GodFault-Redux PoCs were released; a mitigation minifilter was provided to MSRC and an Elastic Defend policy flag is available to block the technique on affected systems.
- Microsoft patched some Windows versions but chose not to patch all affected Mainstream-support builds, leaving a βforever-dayβ window on several fully-patched systems as of February 2026.
MITRE Techniques
Indicators of Compromise
- [File/Driver Name ] Cloud Files and exploit artifacts β cldflt.sys, cldapi.dll
- [Executable/PoC ] Proof-of-concept binaries and payloads β PPLFault.exe, Redux (PoC) and GodFault-Redux (PoC)
- [Process Names ] Targets and privileged processes referenced β services.exe (victim), WinTcb (spawned PPL), MsMpEng.exe (Windows Defender process)
- [File Paths ] Example local and SMB paths used in experiments β SystemRootSystem32TestDll.dll, live.sysinternals.comProcmon.exe, DeviceMup127.0.0.1c$WindowsSystem32TestDll.dll
- [Domain/IP ] Network examples used in testing β live.sysinternals.com, 127.0.0.1 (loopback SMB)
- [Windows Builds / Versions ] Affected and referenced OS versions β Windows Server 2022 (build 20348.4773), Windows 11 builds referenced in testing and mitigation timeline
- [Reparse Tag / Filter ] Cloud filter indicators β IO_REPARSE_TAG_CLOUD (Cloud Filter reparse tag)
Read more: https://www.elastic.co/security-labs/immutable-illusion