Windows Shell Zero-Day Vulnerability Allows Attackers to Bypass Authentication

Microsoft sounded the alarm on February 10, 2026, with an urgent patch for a zero-day vulnerability in Windows Shell, tracked as CVE-2026-21510.

This high-severity flaw (CVSS score 8.8) is actively exploited in the wild, letting attackers dodge key defenses and run malicious code without warnings.

Windows Shell, the core interface for file explorer, shortcuts, and folders, handles security checks like SmartScreen and “Mark of the Web” (MOTW) tags.

These flags downloaded files as risky, prompting user consent or blocking execution. CVE-2026-21510 exploits a flaw in how Shell processes certain metadata, tricking the system into treating malicious files as trusted local ones.

Attackers craft deceptive LNK (shortcut) files or links. When clicked, the shell skips authentication, executing payloads silently. No pop-ups appear, and the code runs at full user privileges.

MetricValue
CVE IDCVE-2026-21510
TitleWindows Shell Security Feature Bypass Vulnerability
CVSS v3.1 Score8.8 / 10 (High)
Max SeverityImportant
Exploitation StatusExploited (Zero-Day)
Attack VectorNetwork (user interaction required)
Affected PlatformsWindows 10/11, Server 2012-2025
  1. Crafting the Payload: Hackers embed malicious code in an LNK file disguised as a PDF or folder icon.
  2. Bypassing MOTW: The flaw manipulates Shell’s parsing of URL zones, stripping caution flags.
  3. Silent Execution: Victim clicks via phishing email or malicious site; code runs as if locally saved.

This chain evades User Account Control (UAC), SmartScreen, and antivirus heuristics. Real-world attacks link to ransomware or info-stealers, per Microsoft Threat Intelligence Center (MSTIC) reports.

The bug hits broad: Windows 10 (21H2+), Windows 11 (up to 25H2), and Servers (2012 through 2025). Home users face phishing risks; enterprises risk lateral movement in networks.

Credits go to MSTIC and Google’s Threat Intelligence Group for discovery. Exploitation surged post-patch release, targeting unupdated systems.

  • Patch Now: Deploy via Windows Update KB5077179 (Win11), KB5075912 (Win10), equivalents for servers.
  • Interim Defenses:
    • Disable LNK execution via Group Policy: Computer Configuration > Administrative Templates > Windows Components > File Explorer > Hide these specified file name extensions.
    • Enable Attack Surface Reduction (ASR) rules for Office/Edge.
    • Scan with updated Microsoft Defender; block untrusted links.
  • Detection: Monitor Event ID 1116 (Shell execution) and anomalous LNK creations.

Microsoft urges immediate action: “Active exploits demand priority patching.” Until updated, avoid opening shortcuts from emails or web downloads.

This zero-day underscores Windows’ reliance on layered defenses. Stay vigilant, phishers evolve fast.

Follow us on Google News , LinkedIn and X to Get More Instant UpdatesSet Cyberpress as a Preferred Source in Google.

The post Windows Shell Zero-Day Vulnerability Allows Attackers to Bypass Authentication appeared first on Cyber Security News.


Discover more from RSS Feeds Cloud

Subscribe to get the latest posts sent to your email.

Discover more from RSS Feeds Cloud

Subscribe now to keep reading and get access to the full archive.

Continue reading