Microsoft Shell Spoofing Zero-day Vulnerability
What is the Attack? | A newly disclosed vulnerability, CVE-2026-32202, has emerged due to an incomplete patch by Microsoft for a previously exploited remote code execution flaw (CVE-2026-21510). While the original update addressed both RCE and SmartScreen bypass, it failed to eliminate a residual zero-click NTLM authentication coercion issue. This allows attackers to silently force a victim system to authenticate against a malicious server without user interaction. |
What is the recommended Mitigation? | Mitigation & Recommendations
Detection Opportunities
|
What FortiGuard Coverage is available? | • FortiGuard Intrusion Prevention System (IPS) Service: FortiGuard IPS provides coverage to detect and block exploitation attempts targeting CVE-2026-32202. Intrusion Prevention | FortiGuard Labs • FortiGuard Endpoint Vulnerability Service provides a systematic and automated method of patching, eliminating manual processes while reducing the attack surface for CVE-2026-21510, CVE-2026-21513, and CVE-2026-32202. |
Additional Resources
Windows Shell Spoofing Vulnerability (update-guide) CVE-2026-32202
Akamai research Blog