Protection mechanism failure in Windows Shell allows an unauthorized attacker to perform spoofing over a network.
| Vendor | Product | Versions |
|---|---|---|
| Microsoft | Windows 10 Version 1607 | 10.0.14393.0, 10.0.17763.0, 10.0.19044.0, 10.0.19045.0, 10.0.22631.0, 10.0.22631.0, 10.0.26100.0, 10.0.26200.0, 10.0.28000.0, 6.2.9200.0, 6.2.9200.0, 6.3.9600.0, 6.3.9600.0, 10.0.14393.0, 10.0.14393.0, 10.0.17763.0, 10.0.17763.0, 10.0.20348.0, 10.0.25398.0, 10.0.26100.0, 10.0.26100.0 |
Downstream vendors/products affected by this vulnerability
| Vendor | Product | Source | Confidence |
|---|---|---|---|
| microsoft | windows 11 version 24h2 | mitre_affected | 90% |
| microsoft | windows server 2019 (server core installation) | mitre_affected | 90% |
| microsoft | windows 11 version 26h1 | mitre_affected | 90% |
| microsoft | windows server 2022, 23h2 edition (server core installation) | mitre_affected | 90% |
| microsoft | windows 10 version 22h2 | mitre_affected | 90% |
Updated description with details on CVE-2026-32202 and changed severity to HIGH.
Initial creation