Microsoft and CISA Warn of Active Attacks on Windows Shell Zero-Day CVE-2026-32202 for Credential Theft

Actively Exploited Windows Zero-Day (CVE-2026-32202) Steals NTLM Hashes Without User Clicks

CRITICAL
April 30, 2026
May 1, 2026
5m read
VulnerabilityCyberattackThreat Actor

Related Entities(initial)

Threat Actors

Organizations

Products & Tech

Windows 10Windows 11Windows Server

CVE Identifiers

Full Report(when first published)

Executive Summary

Microsoft and the U.S. Cybersecurity and Infrastructure Security Agency (CISA) have issued urgent warnings regarding the active exploitation of a zero-click spoofing vulnerability in Windows Shell, tracked as CVE-2026-32202. This flaw allows an unauthenticated attacker to steal a user's Net-NTLMv2 hash without any user interaction beyond navigating to a directory containing a malicious file. The vulnerability is a bypass of a patch for a previous flaw, CVE-2026-21510, which was exploited by the Russian state-sponsored group APT28. Due to evidence of active exploitation, CISA has added CVE-2026-32202 to its Known Exploited Vulnerabilities (KEV) catalog, requiring federal agencies to patch. All organizations are strongly advised to apply the available security updates to prevent credential theft and subsequent lateral movement.


Vulnerability Details

CVE-2026-32202 is a spoofing vulnerability that enables NTLM relay attacks. The flaw exists in how the Windows Shell handles the processing of certain file types, such as .LNK (shortcut) files. An attacker can craft a malicious file and place it on a remote share or in a location accessible to the victim.

When a user opens the folder containing this malicious file in Windows Explorer, the operating system attempts to render the file's icon. This process triggers an automatic connection from the victim's machine to an attacker-controlled Server Message Block (SMB) server. This connection attempt leaks the user's Net-NTLMv2 hash to the attacker. The key aspect of this attack is that it is "zero-click"β€”the victim does not need to open or interact with the file itself; simply viewing it in an Explorer window is sufficient.

This vulnerability is the result of an incomplete patch for CVE-2026-21510, which was addressed in February 2026. While the earlier patch prevented remote code execution, it failed to block the SMB connection that leads to the credential leak.

Affected Systems

The vulnerability affects a wide range of currently supported Microsoft Windows versions, including:

  • Windows 10
  • Windows 11
  • Windows Server

Exploitation Status

Both Microsoft and CISA have confirmed that CVE-2026-32202 is being actively exploited in the wild. The precursor vulnerability, CVE-2026-21510, was used by APT28 (also known as Fancy Bear) in attacks against organizations in Ukraine and the European Union. While Microsoft has not yet attributed the current exploitation of CVE-2026-32202 to APT28, the potential for state-sponsored actors to leverage this flaw is high.

Impact Assessment

Once an attacker obtains a user's Net-NTLMv2 hash, they can mount several types of attacks:

  • NTLM Relay Attacks: The attacker can relay the captured hash to another service on the network (e.g., a domain controller, file server, or application server) to authenticate as the victim user. If the user has administrative privileges, this can lead to a full system or domain compromise.
  • Offline Password Cracking: While Net-NTLMv2 hashes are more resistant to cracking than older versions, a sufficiently powerful adversary can still attempt to crack them offline to recover the user's plaintext password.
  • Lateral Movement: Successful authentication via NTLM relay allows an attacker to move laterally across the network, access sensitive data, and deploy further malware like ransomware.

The zero-click nature of the exploit makes it particularly dangerous for use in phishing campaigns or for compromising users who access network shares.


Cyber Observables β€” Hunting Hints

Security teams should hunt for the following patterns to detect potential exploitation:

Type
Network Traffic Pattern
Value
Outbound SMB (TCP/445) to external/untrusted IP addresses
Description
Monitor firewall and proxy logs for any SMB connections originating from workstations and heading to IPs outside the corporate network. This is highly anomalous.
Type
File Name
Value
*.lnk
Description
Monitor for the creation of new .lnk files on network shares or in user directories, especially if they point to external resources.
Type
Event ID
Value
4625 (Windows Security Log)
Description
Look for failed logon events on servers where the source workstation name is the attacker's machine, which can occur during NTLM relay attempts.

Detection & Response

  1. Network Monitoring (D3-NTA): The most effective detection method is to monitor for outbound SMB traffic. Configure firewalls to block outbound TCP port 445 and UDP ports 137-138 from all client subnets to the internet. Log and alert on any attempts to violate this rule.
  2. EDR/XDR Alerts: Modern EDR platforms may have specific behavioral rules to detect NTLM coercion attacks. Look for alerts related to explorer.exe initiating suspicious outbound network connections.
  3. Honeypots: Deploy honeypot accounts with no privileges and monitor for any authentication activity. An alert on a honeypot account attempting to authenticate to a service is a strong indicator of an NTLM relay attack.

Mitigation

  1. Patch Immediately (D3-SU): The primary mitigation is to apply the security update for CVE-2026-32202 released by Microsoft. Given its KEV status, this should be treated as an emergency change.
  2. Block Outbound SMB: Implement strict firewall rules to block all outbound SMB traffic (TCP/445) from your network to the internet. This is a security best practice that mitigates this and many other threats.
  3. Enable SMB Signing: Enforce SMB signing on all clients and servers throughout the domain. This cryptographic protection prevents NTLM relay attacks by ensuring the integrity of SMB communication. This can be configured via Group Policy.
  4. Principle of Least Privilege: Ensure that user and service accounts do not have excessive privileges. Limiting administrative rights makes it harder for an attacker to cause significant damage even if they successfully relay credentials.

Timeline of Events

1
December 1, 2025
APT28 begins exploiting the precursor vulnerability CVE-2026-21510.
2
February 13, 2026
Microsoft releases a patch for CVE-2026-21510, which is later found to be incomplete.
3
April 14, 2026
Microsoft releases a patch for the bypass vulnerability, CVE-2026-32202.
4
April 29, 2026
Microsoft and CISA confirm active exploitation of CVE-2026-32202, and CISA adds it to the KEV catalog.
5
April 30, 2026
This article was published

Article Updates

May 1, 2026

CISA issues binding directive for FCEB agencies to patch CVE-2026-32202 by May 12, 2026.

MITRE ATT&CK Mitigations

Applying the security update from Microsoft is the primary way to fix the vulnerability on affected endpoints.

Blocking outbound SMB traffic (TCP/445) at the network perimeter is a critical compensating control that prevents the credential hash from being leaked to an external attacker.

Enforce SMB Signing via Group Policy to prevent NTLM relay attacks within the internal network.

Restrict administrative privileges to limit the impact of a successful credential relay attack.

D3FEND Defensive Countermeasures

All organizations must treat the patch for CVE-2026-32202 as an emergency deployment. Due to its status as an actively exploited zero-day in the CISA KEV catalog, standard patching cycles should be bypassed. Prioritize all Windows 10, Windows 11, and Windows Server systems, starting with those belonging to high-privilege users (domain admins, executives) and internet-facing servers. Use centralized patch management systems like WSUS or Microsoft Endpoint Configuration Manager to deploy the update and verify its installation across all endpoints. This is the most effective defense against this specific threat.

Implement a default-deny policy for outbound traffic on the perimeter firewall. Specifically, create an explicit rule to block all outbound traffic on TCP port 445 (SMB) from all internal network segments to the internet. This is a critical compensating control that directly disrupts the exploit chain for CVE-2026-32202 by preventing the victim's machine from connecting to the attacker's external SMB server. Any attempted connections should be logged and trigger a high-priority alert for immediate investigation by the security operations team. This single change mitigates a wide range of credential theft and data exfiltration techniques.

Enforce SMB Signing on all Windows clients and servers across the enterprise using Group Policy. This setting requires all SMB packets to be digitally signed, preventing an attacker from modifying them in transit as part of an NTLM relay attack. While this does not prevent the initial hash leak to an external server, it is highly effective at stopping the subsequent lateral movement phase of the attack within the corporate network. Navigate to Computer Configuration\Policies\Windows Settings\Security Settings\Local Policies\Security Options and enable Microsoft network client: Digitally sign communications (always) and Microsoft network server: Digitally sign communications (always). This hardening step significantly raises the difficulty for attackers to leverage stolen credentials internally.

Timeline of Events

1
December 1, 2025

APT28 begins exploiting the precursor vulnerability CVE-2026-21510.

2
February 13, 2026

Microsoft releases a patch for CVE-2026-21510, which is later found to be incomplete.

3
April 14, 2026

Microsoft releases a patch for the bypass vulnerability, CVE-2026-32202.

4
April 29, 2026

Microsoft and CISA confirm active exploitation of CVE-2026-32202, and CISA adds it to the KEV catalog.

Sources & References(when first published)

Article Author

Jason Gomes

Jason Gomes

β€’ Cybersecurity Practitioner

Cybersecurity professional with over 10 years of specialized experience in security operations, threat intelligence, incident response, and security automation. Expertise spans SOAR/XSOAR orchestration, threat intelligence platforms, SIEM/UEBA analytics, and building cyber fusion centers. Background includes technical enablement, solution architecture for enterprise and government clients, and implementing security automation workflows across IR, TIP, and SOC use cases.

Threat Intelligence & AnalysisSecurity Orchestration (SOAR/XSOAR)Incident Response & Digital ForensicsSecurity Operations Center (SOC)SIEM & Security AnalyticsCyber Fusion & Threat SharingSecurity Automation & IntegrationManaged Detection & Response (MDR)

Tags

Zero-DayNTLM RelayCredential TheftAPT28CISA KEVWindows Shell

πŸ“’ Share This Article

Help others stay informed about cybersecurity threats

🎯 MITRE ATT&CK Mapped

Every tactic, technique, and sub-technique used in this threat has been identified and mapped to the MITRE ATT&CK framework for consistent, actionable threat language.

🧠 Enriched & Analyzed

Observables and indicators of compromise (IOCs) have been extracted and cataloged. Risk has been assessed and correlated with known threat actors and historical campaigns.

πŸ›‘οΈ Actionable Guidance

Detection rules, incident response steps, and D3FEND-aligned mitigation strategies are included so your team can act on this intelligence immediately.

πŸ”— STIX Visualizer

Structured threat data is packaged as a STIX 2.1 bundle and can be visualized as an interactive graph β€” relationships between actors, malware, techniques, and indicators.

⚑ Sigma Generator

Sigma detection rules are derived from the threat techniques in this article and can be converted for deployment across any major SIEM or EDR platform.