Skip to content
Activamente explotadaCVSS 4.3 · MEDIUM

CVE-2026-32202

Microsoft Windows Shell contains a protection mechanism failure vulnerability that allows an unauthorized attacker to perform spoofing over a network.

Ver en NVD

Severidad

Puntaje: 4.3(MEDIUM)
Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:L/I:N/A:N
AV: NETWORK
AC: LOW
PR: NONE
UI: REQUIRED
S: UNCHANGED
C: LOW
I: NONE
A: NONE
Tipo de falla (CWE): CWE-693

CISA KEV

Agregada al KEV: 2026-04-28
Fecha límite federal: 2026-05-12
Uso conocido en ransomware: Unknown
Acción requerida

Apply mitigations per vendor instructions, follow applicable BOD 22-01 guidance for cloud services, or discontinue use of the product if mitigations are unavailable.

EPSS

Probabilidad de explotación (próx. 30 días): 0.0719 (7.2%)
Percentil: 91.6%
EPSS: 2026-05-06

Afecta

microsoft:windows_10_1607microsoft:windows_10_1809microsoft:windows_10_21h2microsoft:windows_10_22h2microsoft:windows_11_23h2microsoft:windows_11_24h2microsoft:windows_11_25h2microsoft:windows_11_26h1microsoft:windows_server_2012microsoft:windows_server_2016microsoft:windows_server_2019microsoft:windows_server_2022microsoft:windows_server_2022_23h2microsoft:windows_server_2025

Descripción técnica

Protection mechanism failure in Windows Shell allows an unauthorized attacker to perform spoofing over a network.

Publicada: 14/4/2026, 18:17:27
Última modificación: 28/4/2026, 21:47:02

Referencias

InicioEventosBlogRecursosEquipo