CVE-2026-32202
Published: 14 April 2026
Description
Adversaries may attempt to manipulate features of their artifacts to make them appear legitimate or benign to users and/or security tools.
Security Summary
CVE-2026-32202 is a protection mechanism failure in the Windows Shell that allows an unauthorized attacker to perform spoofing over a network. This vulnerability, associated with CWE-693, affects the Windows Shell component and was published on 2026-04-14 with a CVSS v3.1 base score of 4.3 (AV:N/AC:L/PR:N/UI:R/S:U/C:L/I:N/A:N), indicating medium severity primarily due to low confidentiality impact.
The vulnerability can be exploited by an unauthorized attacker with network access and no required privileges, but it requires user interaction, such as clicking on a malicious link or resource. Successful exploitation enables spoofing attacks, allowing the attacker to impersonate legitimate entities or content viewed by the user, resulting in limited disclosure of sensitive information without impacting integrity or availability.
Microsoft's update guide provides details on mitigation for CVE-2026-32202 at https://msrc.microsoft.com/update-guide/vulnerability/CVE-2026-32202. Security practitioners should consult this advisory for patch availability and recommended remediation steps.
Details
- CWE(s)
- KEV Date Added
- See CISA KEV catalog
Affected Products
MITRE ATT&CK Enterprise Techniques
Why these techniques?
The vulnerability enables spoofing attacks to impersonate legitimate entities or content in the Windows Shell, directly mapping to Masquerading (T1036).