CVE-2026-32202: Zero-Click Windows Shell Coercion
Vulnerability permits unauthenticated attackers to execute zero-click network spoofing and NT LAN Manager (NTLM) authentication coercion via specially crafted Shortcut (.LNK) files. Discovered as the byproduct of an incomplete patch for an earlier zero-day remote code execution (RCE) flaw (CVE-2026-21510), this residual vulnerability has been actively exploited in the wild. The Russian state-sponsored threat group APT28 has heavily weaponised this vulnerability within sophisticated cyber espionage campaigns targeting government, military, and critical infrastructure.
Attackers send a maliciously crafted Shortcut (.LNK) file. When a victim simply opens the folder containing this file, Windows Explorer automatically attempts to load the file's icon. This triggers a background network connection (SMB) to an attacker-controlled server without requiring any user interaction (zero-click).
This background connection leaks the victim's NetNTLMv2 authentication hash. Threat actors can capture this hash to crack passwords offline or perform NTLM relay attacks, allowing them to immediately authenticate to other internal network systems as the victimised user.
Execution Chain
The exploitation sequence proceeds autonomously in the background:
- Namespace Parsing Initiation: The Windows Shell encounters the .LNK file and begins parsing the embedded LinkTargetIDList to determine the file's visual properties. Attackers abused the underlying Windows Shell namespace parsing mechanism to covertly embed Universal Naming Convention (UNC) paths directly inside an _IDCONTROLW structure, disguising the remote payload as a local Control Panel (CPL) object.
- Icon Extraction Trigger: Before the ShellExecuteExW function can ever be invoked, an internal shell function named CControlPanelFolder::GetUIObjectOf is called to extract the display icon.
- Premature Path Resolution: This internal function subsequently invokes PathFileExistsW from within the GetModuleMapped routine to resolve the specific UNC path embedded by the attacker.
- Automatic SMB Handshake: Because the PathFileExistsW API natively queries the remote server designated in the UNC path to verify if the icon resource exists, the Windows operating system automatically and instantaneously initiates a Server Message Block (SMB) handshake with the attacker-controlled server over the network.
The official remediation introduced a new Component Object Model (COM) object, designated ControlPanelLinkSite. This object was explicitly engineered to act as a security gate, enforcing SmartScreen verification via the ShellExecuteExW function before any remote code could be loaded and executed.
PhantomRPC: Unpatched Privilege Escalation
PhantomRPC constitutes a fundamental and currently unpatched architectural flaw in the Windows Remote Procedure Call (RPC) subsystem. By abusing endpoint mapping mechanisms and the inherent nature of service unavailability, local attackers possessing the SeImpersonatePrivilege can deploy fraudulent RPC servers.
Windows allows background processes to communicate via RPC; if a legitimate Windows service is temporarily unavailable, the system fails to verify the authenticity of a replacement server. An attacker with limited local access can deploy a "phantom" RPC server that mimics the missing service.
When a highly privileged system process (like SYSTEM) attempts to contact the missing service, it connects to the attacker's fake server instead. Using the SeImpersonatePrivilege (a right commonly held by default service accounts), the attacker instantly steals the incoming SYSTEM identity, gaining full control over the machine.
Microsoft considers this an "intended architectural behaviour" rather than a bug because it requires SeImpersonatePrivilege to execute. Consequently, they have not assigned a CVE and do not plan to issue a patch.
Recommendations & Mitigations
- Patching: Microsoft addressed CVE-2026-32202 in its April 2026 Patch Tuesday updates. Due to active exploitation, organisations must apply these updates immediately.
- Hardening: To mitigate PhantomRPC, administrators must heavily audit and restrict the SeImpersonatePrivilege across all servers, ensuring only strictly necessary applications possess it.
- NTLM Defences: Enforce SMB Signing and transition to Kerberos authentication to prevent the NTLM relay attacks used in the CVE-2026-32202 exploit chain.
Don’t forget to share this article