Microsoft and the U.S. Cybersecurity and Infrastructure Security Agency (CISA) have issued urgent warnings regarding the active exploitation of a zero-click spoofing vulnerability in Windows Shell, tracked as CVE-2026-32202. This flaw allows an unauthenticated attacker to steal a user's Net-NTLMv2 hash without any user interaction beyond navigating to a directory containing a malicious file. The vulnerability is a bypass of a patch for a previous flaw, CVE-2026-21510, which was exploited by the Russian state-sponsored group APT28. Due to evidence of active exploitation, CISA has added CVE-2026-32202 to its Known Exploited Vulnerabilities (KEV) catalog, requiring federal agencies to patch. All organizations are strongly advised to apply the available security updates to prevent credential theft and subsequent lateral movement.
CVE-2026-32202 is a spoofing vulnerability that enables NTLM relay attacks. The flaw exists in how the Windows Shell handles the processing of certain file types, such as .LNK (shortcut) files. An attacker can craft a malicious file and place it on a remote share or in a location accessible to the victim.
When a user opens the folder containing this malicious file in Windows Explorer, the operating system attempts to render the file's icon. This process triggers an automatic connection from the victim's machine to an attacker-controlled Server Message Block (SMB) server. This connection attempt leaks the user's Net-NTLMv2 hash to the attacker. The key aspect of this attack is that it is "zero-click"βthe victim does not need to open or interact with the file itself; simply viewing it in an Explorer window is sufficient.
This vulnerability is the result of an incomplete patch for CVE-2026-21510, which was addressed in February 2026. While the earlier patch prevented remote code execution, it failed to block the SMB connection that leads to the credential leak.
The vulnerability affects a wide range of currently supported Microsoft Windows versions, including:
Both Microsoft and CISA have confirmed that CVE-2026-32202 is being actively exploited in the wild. The precursor vulnerability, CVE-2026-21510, was used by APT28 (also known as Fancy Bear) in attacks against organizations in Ukraine and the European Union. While Microsoft has not yet attributed the current exploitation of CVE-2026-32202 to APT28, the potential for state-sponsored actors to leverage this flaw is high.
Once an attacker obtains a user's Net-NTLMv2 hash, they can mount several types of attacks:
The zero-click nature of the exploit makes it particularly dangerous for use in phishing campaigns or for compromising users who access network shares.
Security teams should hunt for the following patterns to detect potential exploitation:
*.lnk.lnk files on network shares or in user directories, especially if they point to external resources.4625 (Windows Security Log)explorer.exe initiating suspicious outbound network connections.CISA issues binding directive for FCEB agencies to patch CVE-2026-32202 by May 12, 2026.
Applying the security update from Microsoft is the primary way to fix the vulnerability on affected endpoints.
Blocking outbound SMB traffic (TCP/445) at the network perimeter is a critical compensating control that prevents the credential hash from being leaked to an external attacker.
Enforce SMB Signing via Group Policy to prevent NTLM relay attacks within the internal network.
Restrict administrative privileges to limit the impact of a successful credential relay attack.
All organizations must treat the patch for CVE-2026-32202 as an emergency deployment. Due to its status as an actively exploited zero-day in the CISA KEV catalog, standard patching cycles should be bypassed. Prioritize all Windows 10, Windows 11, and Windows Server systems, starting with those belonging to high-privilege users (domain admins, executives) and internet-facing servers. Use centralized patch management systems like WSUS or Microsoft Endpoint Configuration Manager to deploy the update and verify its installation across all endpoints. This is the most effective defense against this specific threat.
Implement a default-deny policy for outbound traffic on the perimeter firewall. Specifically, create an explicit rule to block all outbound traffic on TCP port 445 (SMB) from all internal network segments to the internet. This is a critical compensating control that directly disrupts the exploit chain for CVE-2026-32202 by preventing the victim's machine from connecting to the attacker's external SMB server. Any attempted connections should be logged and trigger a high-priority alert for immediate investigation by the security operations team. This single change mitigates a wide range of credential theft and data exfiltration techniques.
Enforce SMB Signing on all Windows clients and servers across the enterprise using Group Policy. This setting requires all SMB packets to be digitally signed, preventing an attacker from modifying them in transit as part of an NTLM relay attack. While this does not prevent the initial hash leak to an external server, it is highly effective at stopping the subsequent lateral movement phase of the attack within the corporate network. Navigate to Computer Configuration\Policies\Windows Settings\Security Settings\Local Policies\Security Options and enable Microsoft network client: Digitally sign communications (always) and Microsoft network server: Digitally sign communications (always). This hardening step significantly raises the difficulty for attackers to leverage stolen credentials internally.
APT28 begins exploiting the precursor vulnerability CVE-2026-21510.
Microsoft releases a patch for CVE-2026-21510, which is later found to be incomplete.
Microsoft releases a patch for the bypass vulnerability, CVE-2026-32202.
Microsoft and CISA confirm active exploitation of CVE-2026-32202, and CISA adds it to the KEV catalog.

Cybersecurity professional with over 10 years of specialized experience in security operations, threat intelligence, incident response, and security automation. Expertise spans SOAR/XSOAR orchestration, threat intelligence platforms, SIEM/UEBA analytics, and building cyber fusion centers. Background includes technical enablement, solution architecture for enterprise and government clients, and implementing security automation workflows across IR, TIP, and SOC use cases.
Help others stay informed about cybersecurity threats
Every tactic, technique, and sub-technique used in this threat has been identified and mapped to the MITRE ATT&CK framework for consistent, actionable threat language.
Observables and indicators of compromise (IOCs) have been extracted and cataloged. Risk has been assessed and correlated with known threat actors and historical campaigns.
Detection rules, incident response steps, and D3FEND-aligned mitigation strategies are included so your team can act on this intelligence immediately.
Structured threat data is packaged as a STIX 2.1 bundle and can be visualized as an interactive graph β relationships between actors, malware, techniques, and indicators.
Sigma detection rules are derived from the threat techniques in this article and can be converted for deployment across any major SIEM or EDR platform.