← back

CVE-2026-32202

MEDIUM · 4.3 KEV EPSS 7.2%
hype LIKELY HACK · 78 hack

KEV confirmed + vendor patching + active exploitation claims, but no public PoC details yet.

What: Windows Shell protection mechanism failure (CVE-2026-32202, CVSS 4.3, EPSS 0.07) allows remote spoofing and zero-click NTLM credential theft via SMB.

Why it matters: KEV-listed 2026-04-28; Microsoft confirmed active exploitation in-the-wild; CISA issued patch deadline (May 12); researchers flag CVSS underestimation—zero-click credential relay enabling domain lateral movement. Incomplete patch of prior flaw means unpatched systems remain exposed.

Where it's seen: Threat intel and SOC teams reporting APT28 exploitation; vendor patching alerts (April Patch Tuesday); federal remediation timeline; security practitioners debating CVSS accuracy and SMB blocking strategies; no public PoC but exploitation confirmed by Microsoft/CISA.

RISK: HIGH — KEV-listed, zero-click, active in-the-wild exploitation, domain lateral movement enablement.

Generated by claude-haiku-4-5 from public posts and authoritative metadata. AI can make mistakes — verify against vendor advisories before acting. 5/2/2026, 1:53:39 PM

Protection mechanism failure in Windows Shell allows an unauthorized attacker to perform spoofing over a network.

Public PoCs on GitHub 8 repos

Page 1 of 2

Articles & coverage 14 articles

Page 1 of 3
NVD details 1 CWE ·1 vendor · 2 refs expand

Description

Protection mechanism failure in Windows Shell allows an unauthorized attacker to perform spoofing over a network.

Weaknesses

Vendors

  • microsoft

Products

  • windows_10_1607
  • windows_10_1809
  • windows_10_21h2
  • windows_10_22h2
  • windows_11_23h2
  • windows_11_24h2
  • windows_11_25h2
  • windows_11_26h1
  • windows_server_2012
  • windows_server_2016
  • windows_server_2019
  • windows_server_2022
  • +2 more

References

Top posts driving the trend