Microsoft patch fell short. New Windows flaw exploited
Briefly

Microsoft patch fell short. New Windows flaw exploited
"CVE-2026-32202 is an authentication coercion flaw in Windows Shell that can expose sensitive information on vulnerable systems via network spoofing. An attacker who successfully exploited the vulnerability could view some sensitive information."
"Microsoft marked the bug as 'exploitation detected.' The next day, CISA added CVE-2026-32202 to its Known Exploited Vulnerabilities catalog, and set a May 12 deadline for federal agencies to fix the flaw."
"Akamai credited senior security researcher Maor Dahan with finding and reporting CVE-2026-32202, stating that an incomplete patch for CVE-2026-21510 created the newer vulnerability."
"APT28 exploited CVE-2026-21510 in attacks against Ukraine and European Union countries, beginning with a phishing email that contained a weaponized LNK file to exploit."
Microsoft and CISA warned of exploitation of CVE-2026-32202, a zero-click Windows flaw that exposes sensitive information. The vulnerability arises from an incomplete fix for CVE-2026-21510, previously exploited by Russian APT28. Microsoft marked the bug as 'exploitation detected' and CISA added it to its Known Exploited Vulnerabilities catalog, setting a May 12 deadline for federal agencies to address the issue. Akamai's Maor Dahan discovered the flaw, linking it to earlier attacks against Ukraine and EU countries via phishing emails.
Read at Theregister
Unable to calculate read time
[
|
]