Medium severity4.3CISA KEVNVD Advisory· Published Apr 14, 2026· Updated Apr 28, 2026
CVE-2026-32202
CVE-2026-32202
Description
Protection mechanism failure in Windows Shell allows an unauthorized attacker to perform spoofing over a network.
Affected products
25cpe:2.3:o:microsoft:windows_10_1607:*:*:*:*:*:*:x64:*+ 1 more
- cpe:2.3:o:microsoft:windows_10_1607:*:*:*:*:*:*:x64:*range: <10.0.14393.9060
- cpe:2.3:o:microsoft:windows_10_1607:*:*:*:*:*:*:x86:*range: <10.0.14393.9060
cpe:2.3:o:microsoft:windows_10_1809:*:*:*:*:*:*:x64:*+ 1 more
- cpe:2.3:o:microsoft:windows_10_1809:*:*:*:*:*:*:x64:*range: <10.0.17763.8644
- cpe:2.3:o:microsoft:windows_10_1809:*:*:*:*:*:*:x86:*range: <10.0.17763.8644
cpe:2.3:o:microsoft:windows_10_21h2:*:*:*:*:*:*:arm64:*+ 2 more
- cpe:2.3:o:microsoft:windows_10_21h2:*:*:*:*:*:*:arm64:*range: <10.0.19044.7184
- cpe:2.3:o:microsoft:windows_10_21h2:*:*:*:*:*:*:x64:*range: <10.0.19044.7184
- cpe:2.3:o:microsoft:windows_10_21h2:*:*:*:*:*:*:x86:*range: <10.0.19044.7184
cpe:2.3:o:microsoft:windows_10_22h2:*:*:*:*:*:*:arm64:*+ 2 more
- cpe:2.3:o:microsoft:windows_10_22h2:*:*:*:*:*:*:arm64:*range: <10.0.19045.7184
- cpe:2.3:o:microsoft:windows_10_22h2:*:*:*:*:*:*:x64:*range: <10.0.19045.7184
- cpe:2.3:o:microsoft:windows_10_22h2:*:*:*:*:*:*:x86:*range: <10.0.19045.7184
cpe:2.3:o:microsoft:windows_11_23h2:*:*:*:*:*:*:arm64:*+ 1 more
- cpe:2.3:o:microsoft:windows_11_23h2:*:*:*:*:*:*:arm64:*range: <10.0.22631.6936
- cpe:2.3:o:microsoft:windows_11_23h2:*:*:*:*:*:*:x64:*range: <10.0.22631.6936
cpe:2.3:o:microsoft:windows_11_24h2:*:*:*:*:*:*:arm64:*+ 1 more
- cpe:2.3:o:microsoft:windows_11_24h2:*:*:*:*:*:*:arm64:*range: <10.0.26100.8246
- cpe:2.3:o:microsoft:windows_11_24h2:*:*:*:*:*:*:x64:*range: <10.0.26100.8246
cpe:2.3:o:microsoft:windows_11_25h2:*:*:*:*:*:*:arm64:*+ 1 more
- cpe:2.3:o:microsoft:windows_11_25h2:*:*:*:*:*:*:arm64:*range: <10.0.26200.8246
- cpe:2.3:o:microsoft:windows_11_25h2:*:*:*:*:*:*:x64:*range: <10.0.26200.8246
cpe:2.3:o:microsoft:windows_11_26h1:*:*:*:*:*:*:arm64:*+ 1 more
- cpe:2.3:o:microsoft:windows_11_26h1:*:*:*:*:*:*:arm64:*range: <10.0.28000.1836
- cpe:2.3:o:microsoft:windows_11_26h1:*:*:*:*:*:*:x64:*range: <10.0.28000.1836
cpe:2.3:o:microsoft:windows_server_2012:-:*:*:*:*:*:*:*+ 1 more
- cpe:2.3:o:microsoft:windows_server_2012:-:*:*:*:*:*:*:*
- cpe:2.3:o:microsoft:windows_server_2012:r2:*:*:*:*:*:*:*
- cpe:2.3:o:microsoft:windows_server_2016:*:*:*:*:*:*:*:*Range: <10.0.14393.9060
- cpe:2.3:o:microsoft:windows_server_2019:*:*:*:*:*:*:*:*Range: <10.0.17763.8644
- cpe:2.3:o:microsoft:windows_server_2022:*:*:*:*:*:*:*:*Range: <10.0.20348.5020
- cpe:2.3:o:microsoft:windows_server_2022_23h2:*:*:*:*:*:*:*:*Range: <10.0.25398.2274
- cpe:2.3:o:microsoft:windows_server_2025:*:*:*:*:*:*:*:*Range: <10.0.26100.32690
Patches
0No patches discovered yet.
Vulnerability mechanics
AI mechanics synthesis has not run for this CVE yet.
References
2- msrc.microsoft.com/update-guide/vulnerability/CVE-2026-32202nvdVendor Advisory
- www.cisa.gov/known-exploited-vulnerabilities-catalognvdUS Government ResourceThird Party Advisory
News mentions
6- TeamPCP Weekly Analysis: 2026-W18 (2026-04-27 through 2026-05-03), (Mon, May 4th)SANS Internet Storm Center · May 4, 2026
- ⚡ Weekly Recap: AI-Powered Phishing, Android Spying Tool, Linux Exploit, GitHub RCE & MoreThe Hacker News · May 4, 2026
- Week in review: High-severity LPE vulnerability in the Linux kernel, cPanel 0-day exploited for monthsHelp Net Security · May 3, 2026
- Microsoft's patch for a 0-day exploited by Russian spies fell short. Another Windows flaw is under attackThe Register Security · Apr 29, 2026
- Microsoft Confirms Active Exploitation of Windows Shell CVE-2026-32202The Hacker News · Apr 28, 2026
- CISA Adds Two Known Exploited Vulnerabilities to CatalogCISA Alerts