★ 8/10 · General · 2026-04-29

Microsoft's patch for a 0-day exploited by Russian spies fell short. Another Windows flaw is under attack

A new zero-click Windows Shell vulnerability, tracked as CVE-2026-32202, is currently being exploited in the wild. The flaw is the result of an incomplete patch for CVE-2026-21510 and allows attackers to coerce...

Microsoft's patch for a 0-day exploited by Russian spies fell short. Another Windows flaw is under attack

Summary

A new zero-click Windows Shell vulnerability, tracked as CVE-2026-32202, is currently being exploited in the wild. The flaw is the result of an incomplete patch for CVE-2026-21510 and allows attackers to coerce authentication to expose sensitive information.

Key Points

  • CVE-2026-32202 is an authentication coercion flaw within the Windows Shell.
  • The vulnerability is a zero-click exploit that can be triggered via auto-parsed LNK files.
  • The flaw originated from an incomplete fix for CVE-2002-21510, which was addressed in the February Patch Tuesday update.
  • Successful exploitation allows attackers to capture Net-NTLMv2 hashes via network spoofing.
  • CISA has added CVE-2026-32202 to its Known Exploited Vulnerabilities catalog, with a remediation deadline of May 12.

Technical Details

The vulnerability stems from a gap between path resolution and trust verification within the Windows Shell. While the February patch for CVE-2026-21510 successfully mitigated remote code execution (RCE) and SmartScreen bypasses, it failed to prevent the victim machine from automatically authenticating to an attacker-controlled server.

An attacker can leverage auto-parsed LNK files to trigger this authentication coercion. By using network spoofing techniques, the attacker forces the victim's machine to attempt authentication against a malicious server, effectively leaking the user's Net-NTLMv2 hash. This captured authentication data can then be used to impersonate the user, access sensitive information, and facilitate lateral movement within the network.

Impact / Why It Matters

This vulnerability enables zero-click credential theft and unauthorized network access, posing a high risk to environments where Net-NTLMv2 hashes can be intercepted. System administrators and developers must ensure all Windows systems are updated to address the authentication coercion vector.

security windows vulnerability