Skip to content
Actively exploitedCVSS 4.3 · MEDIUM

CVE-2026-32202

Microsoft Windows Shell contains a protection mechanism failure vulnerability that allows an unauthorized attacker to perform spoofing over a network.

View on NVD

Severity

Score: 4.3(MEDIUM)
Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:L/I:N/A:N
AV: NETWORK
AC: LOW
PR: NONE
UI: REQUIRED
S: UNCHANGED
C: LOW
I: NONE
A: NONE
Weakness (CWE): CWE-693

CISA KEV

Added to KEV: 2026-04-28
Federal patch deadline: 2026-05-12
Known ransomware use: Unknown
Required action

Apply mitigations per vendor instructions, follow applicable BOD 22-01 guidance for cloud services, or discontinue use of the product if mitigations are unavailable.

EPSS

Probability of exploitation (next 30 days): 0.0719 (7.2%)
Percentile: 91.6%
EPSS: 2026-05-06

Affects

microsoft:windows_10_1607microsoft:windows_10_1809microsoft:windows_10_21h2microsoft:windows_10_22h2microsoft:windows_11_23h2microsoft:windows_11_24h2microsoft:windows_11_25h2microsoft:windows_11_26h1microsoft:windows_server_2012microsoft:windows_server_2016microsoft:windows_server_2019microsoft:windows_server_2022microsoft:windows_server_2022_23h2microsoft:windows_server_2025

Technical description

Protection mechanism failure in Windows Shell allows an unauthorized attacker to perform spoofing over a network.

Published: 4/14/2026, 6:17:27 PM
Last modified: 4/28/2026, 9:47:02 PM

References

HomeEventsBlogResourcesTeam