The Immutable Illusion: Pwning Your Kernel with Cloud Files β€” Elastic Security Labs

The Immutable Illusion: Pwning Your Kernel with Cloud Files β€” Elastic Security Labs

Researchers demonstrate a new False File Immutability (FFI) exploit, Redux, that leverages the Windows Cloud Files driver (cldflt.sys) and FltWriteFileEx to modify in-use executables and achieve kernel-level code execution without requiring SMB/network redirectors. The technique bypasses prior mitigations (and remains effective on some patched Windows versions), and proof-of-concept exploits and mitigations (including an Elastic Defend rule and a filesystem minifilter) were released. #FalseFileImmutability #PPLFault

Keypoints

  • New exploit variant β€œRedux” abuses the built-in Cloud Files capability (cldflt.sys/CfExecute) to rehydrate and overwrite files that Windows assumes are immutable, enabling kernel-level exploitation without SMB redirectors.
  • Experiments show IoCreateFileEx(IO_IGNORE_SHARE_ACCESS_CHECK) and FltWriteFileEx can be used by kernel components to open or write to files that are not opened for FILE_WRITE_DATA, undermining Windows sharing and immutability assumptions.
  • Differences between client and server FCB semantics (SMB) explain earlier network-based FFI exploits; Redux demonstrates the same impact can be achieved purely via Cloud Files interactions on the local system.
  • Authors implemented four experiments (ExperimentOne–Four) to prove behavior: IO_IGNORE_SHARE_ACCESS_CHECK opening denied files, SEC_IMAGE protections blocking local writes, SMB/server-side bypass, and FltWriteFileEx writing to non-writable FILE_OBJECTs.
  • Redux and GodFault-Redux PoCs were released; a mitigation minifilter was provided to MSRC and an Elastic Defend policy flag is available to block the technique on affected systems.
  • Microsoft patched some Windows versions but chose not to patch all affected Mainstream-support builds, leaving a β€œforever-day” window on several fully-patched systems as of February 2026.

MITRE Techniques

Indicators of Compromise

  • [File/Driver Name ] Cloud Files and exploit artifacts – cldflt.sys, cldapi.dll
  • [Executable/PoC ] Proof-of-concept binaries and payloads – PPLFault.exe, Redux (PoC) and GodFault-Redux (PoC)
  • [Process Names ] Targets and privileged processes referenced – services.exe (victim), WinTcb (spawned PPL), MsMpEng.exe (Windows Defender process)
  • [File Paths ] Example local and SMB paths used in experiments – SystemRootSystem32TestDll.dll, live.sysinternals.comProcmon.exe, DeviceMup127.0.0.1c$WindowsSystem32TestDll.dll
  • [Domain/IP ] Network examples used in testing – live.sysinternals.com, 127.0.0.1 (loopback SMB)
  • [Windows Builds / Versions ] Affected and referenced OS versions – Windows Server 2022 (build 20348.4773), Windows 11 builds referenced in testing and mitigation timeline
  • [Reparse Tag / Filter ] Cloud filter indicators – IO_REPARSE_TAG_CLOUD (Cloud Filter reparse tag)


Read more: https://www.elastic.co/security-labs/immutable-illusion