Categories: Cyber Security News

Windows Shell Zero-Day Vulnerability Allows Attackers to Bypass Authentication

Microsoft sounded the alarm on February 10, 2026, with an urgent patch for a zero-day vulnerability in Windows Shell, tracked as CVE-2026-21510.

This high-severity flaw (CVSS score 8.8) is actively exploited in the wild, letting attackers dodge key defenses and run malicious code without warnings.

Windows Shell, the core interface for file explorer, shortcuts, and folders, handles security checks like SmartScreen and “Mark of the Web” (MOTW) tags.

These flags downloaded files as risky, prompting user consent or blocking execution. CVE-2026-21510 exploits a flaw in how Shell processes certain metadata, tricking the system into treating malicious files as trusted local ones.

Attackers craft deceptive LNK (shortcut) files or links. When clicked, the shell skips authentication, executing payloads silently. No pop-ups appear, and the code runs at full user privileges.

Metric Value
CVE ID CVE-2026-21510
Title Windows Shell Security Feature Bypass Vulnerability
CVSS v3.1 Score 8.8 / 10 (High)
Max Severity Important
Exploitation Status Exploited (Zero-Day)
Attack Vector Network (user interaction required)
Affected Platforms Windows 10/11, Server 2012-2025
  1. Crafting the Payload: Hackers embed malicious code in an LNK file disguised as a PDF or folder icon.
  2. Bypassing MOTW: The flaw manipulates Shell’s parsing of URL zones, stripping caution flags.
  3. Silent Execution: Victim clicks via phishing email or malicious site; code runs as if locally saved.

This chain evades User Account Control (UAC), SmartScreen, and antivirus heuristics. Real-world attacks link to ransomware or info-stealers, per Microsoft Threat Intelligence Center (MSTIC) reports.

The bug hits broad: Windows 10 (21H2+), Windows 11 (up to 25H2), and Servers (2012 through 2025). Home users face phishing risks; enterprises risk lateral movement in networks.

Credits go to MSTIC and Google’s Threat Intelligence Group for discovery. Exploitation surged post-patch release, targeting unupdated systems.

  • Patch Now: Deploy via Windows Update KB5077179 (Win11), KB5075912 (Win10), equivalents for servers.
  • Interim Defenses:
    • Disable LNK execution via Group Policy: Computer Configuration > Administrative Templates > Windows Components > File Explorer > Hide these specified file name extensions.
    • Enable Attack Surface Reduction (ASR) rules for Office/Edge.
    • Scan with updated Microsoft Defender; block untrusted links.
  • Detection: Monitor Event ID 1116 (Shell execution) and anomalous LNK creations.

Microsoft urges immediate action: “Active exploits demand priority patching.” Until updated, avoid opening shortcuts from emails or web downloads.

This zero-day underscores Windows’ reliance on layered defenses. Stay vigilant, phishers evolve fast.

Follow us on Google News , LinkedIn and X to Get More Instant UpdatesSet Cyberpress as a Preferred Source in Google.

The post Windows Shell Zero-Day Vulnerability Allows Attackers to Bypass Authentication appeared first on Cyber Security News.

rssfeeds-admin

Recent Posts

New EtherRAT Variant Uses Trojanized Tftpd64 Installer to Bridge Web2 Malware and Web3 Theft

A new and more dangerous type of malware is quietly targeting Windows users by hiding…

3 minutes ago

New EtherRAT Variant Uses Trojanized Tftpd64 Installer to Bridge Web2 Malware and Web3 Theft

A new and more dangerous type of malware is quietly targeting Windows users by hiding…

3 minutes ago

SonicWall SonicOS Vulnerabilities Allow Attackers to Bypass Access Controls and Crash Firewall

SonicWall has released a security advisory addressing three vulnerabilities in its SonicOS software. Discovered by…

3 minutes ago

SonicWall SonicOS Vulnerabilities Allow Attackers to Bypass Access Controls and Crash Firewall

SonicWall has released a security advisory addressing three vulnerabilities in its SonicOS software. Discovered by…

3 minutes ago

Europol Busts €50 Million Online Fraud Network Running Corporate-Style Scam Call Centres

A major international law enforcement operation has brought down a large-scale online fraud network that…

4 minutes ago

Europol Busts €50 Million Online Fraud Network Running Corporate-Style Scam Call Centres

A major international law enforcement operation has brought down a large-scale online fraud network that…

4 minutes ago

This website uses cookies.