CyberIntel ⬡ News
★ Saved ◆ Cyber Reads
← Back ⬡ Vulnerabilities & CVEs Apr 08, 2026

Windows Shell Zero-Day Vulnerability Allows Attackers to Bypass Authentication - cyberpress.org

cyberpress.org Archived Apr 08, 2026 ✓ Full text saved

Windows Shell Zero-Day Vulnerability Allows Attackers to Bypass Authentication cyberpress.org

Full text archived locally
✦ AI Summary · Claude Sonnet


    Windows Shell Zero-Day Vulnerability Allows Attackers to Bypass Authentication By AnuPriya February 11, 2026 Categories: Cyber Security NewsCybersecurityZero-day Microsoft sounded the alarm on February 10, 2026, with an urgent patch for a zero-day vulnerability in Windows Shell, tracked as CVE-2026-21510. This high-severity flaw (CVSS score 8.8) is actively exploited in the wild, letting attackers dodge key defenses and run malicious code without warnings. Windows Shell, the core interface for file explorer, shortcuts, and folders, handles security checks like SmartScreen and “Mark of the Web” (MOTW) tags. These flags downloaded files as risky, prompting user consent or blocking execution. CVE-2026-21510 exploits a flaw in how Shell processes certain metadata, tricking the system into treating malicious files as trusted local ones. Attackers craft deceptive LNK (shortcut) files or links. When clicked, the shell skips authentication, executing payloads silently. No pop-ups appear, and the code runs at full user privileges. Metric Value CVE ID CVE-2026-21510 Title Windows Shell Security Feature Bypass Vulnerability CVSS v3.1 Score 8.8 / 10 (High) Max Severity Important Exploitation Status Exploited (Zero-Day) Attack Vector Network (user interaction required) Affected Platforms Windows 10/11, Server 2012-2025 Crafting the Payload: Hackers embed malicious code in an LNK file disguised as a PDF or folder icon. Bypassing MOTW: The flaw manipulates Shell’s parsing of URL zones, stripping caution flags. Silent Execution: Victim clicks via phishing email or malicious site; code runs as if locally saved. This chain evades User Account Control (UAC), SmartScreen, and antivirus heuristics. Real-world attacks link to ransomware or info-stealers, per Microsoft Threat Intelligence Center (MSTIC) reports. The bug hits broad: Windows 10 (21H2+), Windows 11 (up to 25H2), and Servers (2012 through 2025). Home users face phishing risks; enterprises risk lateral movement in networks. Credits go to MSTIC and Google’s Threat Intelligence Group for discovery. Exploitation surged post-patch release, targeting unupdated systems. Patch Now: Deploy via Windows Update KB5077179 (Win11), KB5075912 (Win10), equivalents for servers. Interim Defenses: Disable LNK execution via Group Policy: Computer Configuration > Administrative Templates > Windows Components > File Explorer > Hide these specified file name extensions. Enable Attack Surface Reduction (ASR) rules for Office/Edge. Scan with updated Microsoft Defender; block untrusted links. Detection: Monitor Event ID 1116 (Shell execution) and anomalous LNK creations. Microsoft urges immediate action: “Active exploits demand priority patching.” Until updated, avoid opening shortcuts from emails or web downloads. This zero-day underscores Windows’ reliance on layered defenses. Stay vigilant, phishers evolve fast. Follow us on Google News , LinkedIn and X to Get More Instant Updates. Set Cyberpress as a Preferred Source in Google. Share Facebook Twitter Pinterest WhatsApp AnuPriya Any Priya is a cybersecurity reporter at Cyber Press, specializing in cyber attacks, dark web monitoring, data breaches, vulnerabilities, and malware. She delivers in-depth analysis on emerging threats and digital security trends. Recent Articles Critical CUPS Vulnerability Chain Allows Remote Code Execution as Root Cyber Security News April 7, 2026 Critical Flaw in Windmill Developer Platform Allows Remote Code Execution – PoC Published Cyber Security News April 7, 2026 Long-Running Malware Campaign Uses Fake Installers To Deploy RATs, Monero Miners Cyber Security News April 7, 2026 Hackers Leverage LogMeIn Resolve and ScreenConnect In Phishing Attacks Cyber Security News April 7, 2026 New “GPUBreach” Attack Grants Full System Compromise and Root Shell Access Cyber Security News April 7, 2026 Related Stories Cyber Security News Critical CUPS Vulnerability Chain Allows Remote Code Execution as Root AnuPriya - April 7, 2026 Cyber Security News Critical Flaw in Windmill Developer Platform Allows Remote Code Execution – PoC Published AnuPriya - April 7, 2026 Cyber Security News Long-Running Malware Campaign Uses Fake Installers To Deploy RATs, Monero Miners Varshini - April 7, 2026 Cyber Security News Hackers Leverage LogMeIn Resolve and ScreenConnect In Phishing Attacks Varshini - April 7, 2026 Cyber Security News New “GPUBreach” Attack Grants Full System Compromise and Root Shell Access AnuPriya - April 7, 2026 Cyber Security News Critical Android Zero-Interaction Flaw Triggers Remote DoS Attacks AnuPriya - April 7, 2026 LEAVE A REPLY Comment: Name:* Email:* Website:
    💬 Team Notes
    Article Info
    Source
    cyberpress.org
    Category
    ⬡ Vulnerabilities & CVEs
    Published
    Apr 08, 2026
    Archived
    Apr 08, 2026
    Full Text
    ✓ Saved locally
    Open Original ↗