The U.S. Cybersecurity and Infrastructure Security Agency (CISA) has added CVE-2026-32202, a privilege escalation vulnerability in Microsoft Windows, to its Known Exploited Vulnerabilities (KEV) catalog due to evidence of active exploitation. This vulnerability is particularly notable as it stems from an incomplete patch for a previous zero-day, CVE-2026-21510. The original flaw was exploited by the Russian state-sponsored group APT28 (Fancy Bear) in campaigns targeting entities in Ukraine and the European Union. The new flaw, CVE-2026-32202, is an authentication coercion vulnerability that can be exploited without user interaction (zero-click) to steal credentials. Federal agencies are now required to apply the patch released by Microsoft in April 2026.
.lnk) file in a location that the victim's machine will automatically parse. This can trigger an authentication attempt to an attacker-controlled server, allowing the theft of NTLM hashes.CVE-2026-21510 was incomplete. CVE-2026-21510 was a remote code execution (RCE) vulnerability exploited in the wild by APT28. The incomplete fix left open a new attack surface for credential theft..lnk file on a network share that a user browses with File Explorer, the preview pane's attempt to render the file's icon can be enough to trigger the authentication attempt to the attacker's server, without the user ever clicking on the file.CISA has confirmed that CVE-2026-32202 is being actively exploited in the wild. The original vulnerability, CVE-2026-21510, was used as a zero-day by APT28 since at least December 2025 in conjunction with CVE-2026-21513 (an MSHTML security feature bypass).
The following patterns may help identify exploitation attempts:
network_traffic_patternOutbound SMB traffic (port 445) from workstations to unknown or external IP addresses.log_sourceWindows Security Event Log (ID 4625)file_name*.lnk.lnk files in unusual locations, especially on network shares.process_nameexplorer.exeexplorer.exe process initiating outbound network connections to suspicious IP addresses on port 445.D3-OTF) is directly applicable.explorer.exe or rundll32.exe making outbound SMB connections, which is highly anomalous behavior.Microsoft and CISA confirm active exploitation of CVE-2026-32202, detailing Windows Shell spoofing and NTLM relay attacks, and adding SMB signing as a key mitigation.
Applying the April 2026 Microsoft security update is the primary mitigation.
Blocking outbound SMB (TCP 445) traffic at the perimeter firewall is a critical compensating control.
Disable NTLM authentication in favor of Kerberos to prevent NTLM relay attacks.
The most direct and effective countermeasure for CVE-2026-32202 is to apply the security update provided by Microsoft in its April 2026 patch release. Given that CISA has added this vulnerability to the KEV catalog, organizations must treat this as a critical priority. Federal agencies are mandated to patch within a specific timeframe, and commercial entities should follow suit. Use enterprise patch management systems like WSUS or SCCM to deploy the update across all Windows endpoints and servers. Run authenticated vulnerability scans to verify that the patch has been successfully applied and that no systems were missed.
As a crucial compensating control that mitigates this and many similar credential theft vulnerabilities, organizations must block outbound SMB traffic at the network perimeter. Configure your edge firewalls to deny any egress traffic on TCP port 445. There are almost no legitimate business cases for an internal client to initiate an SMB connection to a server on the internet. This single change prevents the vulnerability from being exploited, as the victim's machine would be unable to send its NTLM hash to the attacker's external server. This is a high-impact, low-disruption defense that should be standard practice.
APT28 begins exploiting the original zero-day, CVE-2026-21510.
Microsoft releases an incomplete patch for CVE-2026-21510.
Microsoft releases a complete fix for the new vulnerability, CVE-2026-32202.
CISA adds CVE-2026-32202 to the Known Exploited Vulnerabilities (KEV) catalog.

Cybersecurity professional with over 10 years of specialized experience in security operations, threat intelligence, incident response, and security automation. Expertise spans SOAR/XSOAR orchestration, threat intelligence platforms, SIEM/UEBA analytics, and building cyber fusion centers. Background includes technical enablement, solution architecture for enterprise and government clients, and implementing security automation workflows across IR, TIP, and SOC use cases.
Help others stay informed about cybersecurity threats
Every tactic, technique, and sub-technique used in this threat has been identified and mapped to the MITRE ATT&CK framework for consistent, actionable threat language.
Observables and indicators of compromise (IOCs) have been extracted and cataloged. Risk has been assessed and correlated with known threat actors and historical campaigns.
Detection rules, incident response steps, and D3FEND-aligned mitigation strategies are included so your team can act on this intelligence immediately.
Structured threat data is packaged as a STIX 2.1 bundle and can be visualized as an interactive graph — relationships between actors, malware, techniques, and indicators.
Sigma detection rules are derived from the threat techniques in this article and can be converted for deployment across any major SIEM or EDR platform.