[CIVN-2026-0218] Spoofing Vulnerability in Windows Shell

By Published On: May 6, 2026

—–BEGIN PGP SIGNED MESSAGE—–

Hash: SHA256


Spoofing Vulnerability in Windows Shell


Indian – Computer Emergency Response Team (https://www.cert-in.org.in)


Severity Rating: CRITICAL


Software Affected


Windows Shell from 10.0.14393.9060 after 10.0.14393.0

Overview


Windows Shell Spoofing is a vulnerability component of Microsoft Windows allows an attacker to perform spoofing on targeted system.


Target Audience:

All-end user organization and individuals using Microsoft Windows Shell.


Risk Assessment:

High risk of unauthorized attacker to perform spoofing.


Impact Assessment:

Potentially executing malicious code, leading to malware infection, data compromise, or unauthorized system access.


Description


The Microsoft Windows Shell is the primary graphical user interface subsystem of the Microsoft Windows responsible for managing and rendering core UI components such as desktop, taskbar and File Explorer. It exposes APIs and COM interfaces for extending shell functionality and integrating application system.


The vulnerability exits in Microsoft Windows Shell manipulates and displays malicious files to appear as legitimate manipulating with the file extensions or icons are displayed. This allows an unauthorized attacker to execute malicious files leading to potential system compromise.


Solution


Apply appropriate updates as mentioned by the vendor:

https://msrc.microsoft.com/update-guide/vulnerability/CVE-2026-32202



References


 

https://msrc.microsoft.com/update-guide/vulnerability/CVE-2026-32202


CVE Name

CVE-2026-32202




– —


Thanks and Regards,

CERT-In


Incident Response Help Desk

e-mail: incident@cert-in.org.in

Phone: +91-11-22902657

Toll Free Number: 1800-11-4949

Toll Free Fax : 1800-11-6969

Web: http://www.cert-in.org.in

PGP Fingerprint: A768 083E 4475 5725 B81A A379 2156 C0C0 B620 D0B4

PGP Key information:

https://www.cert-in.org.in/s2cMainServlet?pageid=CONTACTUS


Postal address:

Indian Computer Emergency Response Team (CERT-In)

Ministry of Electronics and Information Technology

Government of India

Electronics Niketan

6, C.G.O. Complex

New Delhi-110 003

—–BEGIN PGP SIGNATURE—–


iQIzBAEBCAAdFiEE6r4Iam/Ey0c/KakL3jCgcSdcys8FAmn7UpAACgkQ3jCgcSdc

ys/TvhAAhoQ/VjCSMhXoBp8AlmyAHwNDqRyeMLsYzf7FRprumQyyzj2i3SJjhyE0

zGAYsMdQii8w6Jm4xAKdrX6BkGSyZ6KJ24ufDNudn7QLkk53iMTCmAaoUE8V0AUK

mYa/kGZbfQwENOZeSUqCGQ2b3v45p82awwJM/cocQ9QbVvEwTMlAOXLhEoJNx9fe

75h2jKPXMlEunkOoDFnggeYGmxIg5TEw80fleAuZdS6lMwMwe1YTgrO1pKGgJeca

gjNXxvue4tjFiXPddMjisVB9XhQPq9LjYME/C6ONbYCESHDK0bO+NWOIaOBZV4Ar

nSjCFSVOc6ytH5ioC7lx+80KJtZzt6HUKdn3oX+eSJeMD5qmontQc520lFUjHNZQ

NMkWfs8gxaJCo71EZelRso0wnsr5fi5UnrZD/r5oJcjNSgE2g+S/fKuvfujDYhxR

2WyIiHhkCVzhwB4QjuYIb4yw35OjBvKhtMNFyFD2hZNQjPy+JmoLptK9dFiU+8/1

TJB5Bq9k4ViPUBmkzx7a6YCpqwl4tpUquimOEXqOGvYMFhVG3vYgway7zvmSW4sN

ynHcBhbzhXfUqlxTy6fpeKEecMqdzHYJXV9tjQ9YOZuVrEkFslEGRJUzAXdTt1wj

epzp0ObOQH9MYjhPnEhwXeFz1R5XZh/vNR13ijsE4T3XGq9E/18=

=PTYX

—–END PGP SIGNATURE—–

Share this article