Authentication Bypass
Microsoft
Windows 10 Version 1607
Windows 10 Version 1809
Windows 10 Version 21H2
Windows 10 Version 22H2
Windows 11 Version 22H3
Windows 11 Version 23H2
Windows 11 Version 24H2
Windows 11 Version 25H2
Windows 11 Version 26H1
Windows Server 2012
Windows Server 2012 Server Core Installation
Windows Server 2012 R2
Windows Server 2012 R2 Server Core Installation
Windows Server 2016
Windows Server 2016 Server Core Installation
Windows Server 2019
Windows Server 2019 Server Core Installation
Windows Server 2022
Windows Server 2022 23H2 Edition Server Core Installation
Windows Server 2025
Windows Server 2025 Server Core Installation
4.3
CVSS 3.1
Share
CVSS VectorNVD
CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:L/I:N/A:N
Attack Vector
Network
Attack Complexity
Low
Privileges Required
None
User Interaction
Required
Scope
Unchanged
Confidentiality
Low
Integrity
None
Availability
None
Lifecycle Timeline
1
Analysis Generated
Apr 14, 2026 - 19:41 vuln.today
DescriptionNVD
Protection mechanism failure in Windows Shell allows an unauthorized attacker to perform spoofing over a network.
AnalysisAI
Windows Shell protection mechanism failure (CVE-2026-32202) allows remote attackers to perform spoofing attacks over a network without authentication, requiring only user interaction. This low-severity vulnerability affects multiple Windows versions from Windows 10 1607 through Windows 11 26H1 and Windows Server 2012 through 2025. …
Sign in for full analysis, threat intelligence, and remediation guidance.
Share
External POC / Exploit Code
Leaving vuln.today
Destination URL
POC code from unknown sources may be malicious, contain backdoors, or be fake.
Always review and test exploit code in a safe, isolated environment (VM/sandbox).
Verify the source reputation and cross-reference with known databases (Exploit-DB, GitHub Security).
EUVD-2026-22589
GHSA-x62h-w968-3v9v