Actively exploitedCVSS 4.3 · MEDIUM
CVE-2026-32202
Microsoft Windows Shell contains a protection mechanism failure vulnerability that allows an unauthorized attacker to perform spoofing over a network.
View on NVDSeverity
Score: 4.3(MEDIUM)
Vector:
CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:L/I:N/A:NAV: NETWORK
AC: LOW
PR: NONE
UI: REQUIRED
S: UNCHANGED
C: LOW
I: NONE
A: NONE
Weakness (CWE):
CWE-693CISA KEV
Added to KEV: 2026-04-28
Federal patch deadline: 2026-05-12
Known ransomware use: Unknown
Required action
Apply mitigations per vendor instructions, follow applicable BOD 22-01 guidance for cloud services, or discontinue use of the product if mitigations are unavailable.
EPSS
Probability of exploitation (next 30 days): 0.0719 (7.2%)
Percentile: 91.6%
EPSS: 2026-05-06
Affects
microsoft:windows_10_1607microsoft:windows_10_1809microsoft:windows_10_21h2microsoft:windows_10_22h2microsoft:windows_11_23h2microsoft:windows_11_24h2microsoft:windows_11_25h2microsoft:windows_11_26h1microsoft:windows_server_2012microsoft:windows_server_2016microsoft:windows_server_2019microsoft:windows_server_2022microsoft:windows_server_2022_23h2microsoft:windows_server_2025Technical description
Protection mechanism failure in Windows Shell allows an unauthorized attacker to perform spoofing over a network.
Published: 4/14/2026, 6:17:27 PM
Last modified: 4/28/2026, 9:47:02 PM