Overview
CVE-2026-32202 is a Windows Shell protection mechanism failure that allows an attacker to steal Net-NTLMv2 credential hashes from victims by tricking them into opening (or even simply viewing) a malicious Windows Shortcut (LNK) file. The vulnerability exists because Microsoft's February 2026 patch for an APT28-exploited zero-day (CVE-2026-21510) was incomplete: it added SmartScreen validation but still permitted the underlying NTLM authentication coercion.
Although its CVSS score is 4.3 (Medium), the real-world impact is significant: captured Net-NTLMv2 hashes can be cracked offline to recover plaintext passwords, or used directly in NTLM relay attacks to authenticate to other services on the network without knowing the password. This vulnerability has been linked to APT28 (Fancy Bear), a Russian state-sponsored threat group with a history of targeting government, military, and critical infrastructure.
Background: APT28's Zero-Day Chain
CVE-2026-32202 is the third act in a multi-step vulnerability chain that originated with Russian intelligence operations:
-
December 2025 — APT28 (also known as Fancy Bear, Forest Blizzard, GruesomeLarch) launches LNK-based attacks against Ukraine and EU nations, weaponizing CVE-2026-21510 and CVE-2026-21513 together. According to CERT-UA, the campaign used crafted Windows Shortcut files to trigger automatic NTLM authentication to attacker-controlled servers.
-
February 2026 — Microsoft patches CVE-2026-21510 and CVE-2026-21513 in the February 2026 Patch Tuesday. The fix added Microsoft Defender SmartScreen validation for the affected file-handling code path.
-
April 2026 — Maor Dahan, a Senior Security Researcher at Akamai, discovers that the February patch was incomplete. While SmartScreen now blocks execution of the malicious payload, the underlying Windows Shell namespace parser still resolves UNC paths and initiates an SMB authentication handshake before SmartScreen can intervene — leaking the victim's Net-NTLMv2 hash to the attacker's server.
Technical Details
Root cause (CWE-693): The Windows Shell namespace parsing mechanism processes UNC paths (e.g., \\attacker.com\share\file) embedded in LNK shortcut files. When Windows encounters such a path — even just while rendering an icon or file preview — it automatically initiates an SMB connection to resolve the remote resource. This SMB connection triggers NTLM authentication, sending the victim's Net-NTLMv2 hash to the attacker-controlled server.
The protection mechanism that should prevent this (SmartScreen, or path validation) fails to intercept the coercion before the NTLM handshake occurs. The result is a zero-click credential leak in contexts where LNK files are automatically parsed (e.g., opening a folder in Explorer, previewing a file).
Attack flow:
- Attacker crafts a malicious
.lnkfile containing a UNC path pointing to an attacker-controlled SMB server - Victim receives the file (via email, file share, USB drive, cloud storage, etc.)
- Windows Shell parses the LNK file — no double-click required if the folder is open in Explorer
- Windows initiates SMB connection to the attacker's server
- NTLM authentication handshake occurs automatically — the victim's Net-NTLMv2 hash is transmitted to the attacker
- Attacker captures the hash and either: (a) cracks it offline to recover the plaintext password, or (b) relays it to authenticate to another service (NTLM relay attack)
CVSS context: The 4.3 Medium score reflects that the direct impact is limited to credential disclosure (C:L, I:N, A:N) and requires user interaction (UI:R — the victim must open or view the malicious file). However, the downstream impact of credential theft — lateral movement, further compromise, persistent access — can far exceed what the base score implies.
Affected Versions
All actively supported versions of Windows are affected. The April 2026 Patch Tuesday addresses CVE-2026-32202 across the following versions:
| Windows Version | Patch KB |
|---|---|
| Windows 10 1607 | KB5082198 |
| Windows 10 1809 | KB5082123 |
| Windows 10 21H2 / 22H2 | KB5082200 |
| Windows 11 23H2 | KB5082052 |
| Windows 11 24H2 / 25H2 | KB5083769 |
| Windows 11 26H1 | KB5083768 |
| Windows Server 2012 | KB5082127 |
| Windows Server 2012 R2 | KB5082126 |
| Windows Server 2016 | KB5082198 |
| Windows Server 2019 | KB5082123 |
| Windows Server 2022 (21H2 / 22H2) | KB5082142 |
| Windows Server 2022 (23H2) | KB5082060 |
| Windows Server 2025 | KB5082063 |
Discovery
The vulnerability was discovered by Maor Dahan, Senior Security Researcher at Akamai, while analyzing the completeness of Microsoft's February 2026 patches for the APT28 zero-day chain. Dahan's research — published in the Akamai blog post "A Shortcut to Coercion" — demonstrated that while the February patch blocked payload execution, it left the NTLM coercion channel fully open.
Exploitation Context
Active exploitation has been confirmed by Microsoft as of April 27, 2026. The CVE is a direct descendant of APT28's offensive toolkit, with the same LNK-based NTLM coercion technique used in documented campaigns against Ukrainian government targets and EU entities in December 2025.
Why this matters beyond APT28: Once a nation-state technique becomes publicly documented and patched, the underlying tradecraft propagates to criminal groups and commodity threat actors. NTLM credential coercion via LNK files is well-understood in offensive security tooling (Responder, Impacket), meaning this bypass is accessible to a wide range of attackers — not just sophisticated state actors.
What attackers do with captured hashes:
- Offline password cracking — Net-NTLMv2 hashes can be submitted to tools like Hashcat or cracked using cloud GPU instances, recovering the plaintext password if it is not sufficiently complex
- NTLM relay attacks — the captured hash can be relayed in real time to authenticate to Exchange, SharePoint, file servers, and other services that accept NTLM authentication, without ever knowing the plaintext password
- Targeted phishing follow-up — knowing a user's credentials enables highly credible spear-phishing or account takeover
Remediation
- Apply the April 2026 Patch Tuesday update for your Windows version using the KB numbers in the table above. Verify via Settings → Windows Update or
winver+wmic qfe list. - Disable NTLM where possible — consider enabling the "Network security: Restrict NTLM" Group Policy settings to block outbound NTLM authentication to external servers.
- Block outbound SMB (TCP 445) at the firewall perimeter — prevents NTLM hash coercion to internet-hosted attacker servers. This is a critical defense-in-depth measure regardless of patch status.
- Enable Extended Protection for Authentication (EPA) on Exchange, IIS, and other services that support it, to block NTLM relay attacks even if hashes are captured.
- Deploy Microsoft Defender Credential Guard on Windows 11 and Windows Server 2019+ systems to prevent NTLM hash extraction from LSASS.
- Monitor for suspicious SMB connections — outbound SMB to external or unexpected IP addresses is a strong indicator of NTLM coercion in progress.
- Audit email and file-share delivery of LNK files — consider blocking
.lnkattachments at the mail gateway and enforcing policies against opening shortcut files from untrusted sources.
Key Details
| Property | Value |
|---|---|
| CVE ID | CVE-2026-32202 |
| Vendor / Product | Microsoft — Windows |
| NVD Published | 2026-04-14 |
| NVD Last Modified | 2026-04-28 |
| CVSS 3.1 Score | 4.3 |
| CVSS 3.1 Vector | CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:L/I:N/A:N |
| Severity | MEDIUM |
| CWE | CWE-693 — Protection Mechanism Failure |
| CISA KEV Added | 2026-04-28 |
| CISA KEV Deadline | 2026-05-12 |
| Known Ransomware Use | No |
CVSS 3.1 Breakdown
Required Action
Timeline
| Date | Event |
|---|---|
| 2025-12 | APT28 (Fancy Bear) weaponizes CVE-2026-21510 and CVE-2026-21513 in LNK-based attacks against Ukraine and EU nations |
| 2026-02 | Microsoft patches CVE-2026-21510 and CVE-2026-21513 in February 2026 Patch Tuesday |
| 2026-04-14 | CVE-2026-32202 published — Maor Dahan (Akamai) identifies that February patch was incomplete, leaving NTLM coercion vector open |
| 2026-04-27 | Microsoft corrects exploitability metadata and confirms active exploitation in the wild |
| 2026-04-28 | Added to CISA Known Exploited Vulnerabilities catalog |
| 2026-05-12 | CISA BOD 22-01 remediation deadline |
References
| Resource | Type |
|---|---|
| NVD — CVE-2026-32202 | Vulnerability Database |
| CISA KEV Catalog Entry | US Government |
| Microsoft Security Response Center — CVE-2026-32202 | Vendor Advisory / Patch |
| Akamai — A Shortcut to Coercion: Incomplete Patch of APT28's Zero-Day Leads to CVE-2026-32202 | Security Research |
| The Hacker News — Microsoft Confirms Active Exploitation of Windows Shell CVE-2026-32202 | News |
| SecurityWeek — Incomplete Windows Patch Opens Door to Zero-Click Attacks | News |
| CWE-693 — Protection Mechanism Failure | Weakness Classification |