This high-severity flaw (CVSS score 8.8) is actively exploited in the wild, letting attackers dodge key defenses and run malicious code without warnings.
Windows Shell, the core interface for file explorer, shortcuts, and folders, handles security checks like SmartScreen and “Mark of the Web” (MOTW) tags.
These flags downloaded files as risky, prompting user consent or blocking execution. CVE-2026-21510 exploits a flaw in how Shell processes certain metadata, tricking the system into treating malicious files as trusted local ones.
Attackers craft deceptive LNK (shortcut) files or links. When clicked, the shell skips authentication, executing payloads silently. No pop-ups appear, and the code runs at full user privileges.
| Metric | Value |
|---|---|
| CVE ID | CVE-2026-21510 |
| Title | Windows Shell Security Feature Bypass Vulnerability |
| CVSS v3.1 Score | 8.8 / 10 (High) |
| Max Severity | Important |
| Exploitation Status | Exploited (Zero-Day) |
| Attack Vector | Network (user interaction required) |
| Affected Platforms | Windows 10/11, Server 2012-2025 |
- Crafting the Payload: Hackers embed malicious code in an LNK file disguised as a PDF or folder icon.
- Bypassing MOTW: The flaw manipulates Shell’s parsing of URL zones, stripping caution flags.
- Silent Execution: Victim clicks via phishing email or malicious site; code runs as if locally saved.
This chain evades User Account Control (UAC), SmartScreen, and antivirus heuristics. Real-world attacks link to ransomware or info-stealers, per Microsoft Threat Intelligence Center (MSTIC) reports.
The bug hits broad: Windows 10 (21H2+), Windows 11 (up to 25H2), and Servers (2012 through 2025). Home users face phishing risks; enterprises risk lateral movement in networks.
Credits go to MSTIC and Google’s Threat Intelligence Group for discovery. Exploitation surged post-patch release, targeting unupdated systems.
- Patch Now: Deploy via Windows Update KB5077179 (Win11), KB5075912 (Win10), equivalents for servers.
- Interim Defenses:
- Disable LNK execution via Group Policy:
Computer Configuration > Administrative Templates > Windows Components > File Explorer > Hide these specified file name extensions. - Enable Attack Surface Reduction (ASR) rules for Office/Edge.
- Scan with updated Microsoft Defender; block untrusted links.
- Disable LNK execution via Group Policy:
- Detection: Monitor Event ID 1116 (Shell execution) and anomalous LNK creations.
Microsoft urges immediate action: “Active exploits demand priority patching.” Until updated, avoid opening shortcuts from emails or web downloads.
This zero-day underscores Windows’ reliance on layered defenses. Stay vigilant, phishers evolve fast.
Follow us on Google News , LinkedIn and X to Get More Instant Updates. Set Cyberpress as a Preferred Source in Google.
The post Windows Shell Zero-Day Vulnerability Allows Attackers to Bypass Authentication appeared first on Cyber Security News.
Discover more from RSS Feeds Cloud
Subscribe to get the latest posts sent to your email.
