Critical Windows 0-Click Vulnerability Exploited to Bypass Defender SmartScreen
A critical zero-click vulnerability, identified as CVE-2026-32202, has been actively exploited by the Russian state-sponsored group APT28, also known as Fancy Bear, Forest Blizzard, and Pawn Storm. This flaw allows attackers to bypass Windows Defender SmartScreen, enabling the execution of malicious code without user interaction.
Background and Discovery
In December 2025, CERT-UA reported that APT28 launched cyberattacks targeting Ukraine and several European Union countries. The attackers utilized weaponized Windows Shortcut (LNK) files to exploit this vulnerability. By January 2026, Akamai researchers had identified the campaign, linking it to two chained vulnerabilities: CVE-2026-21513, an MSHTML exploit, and CVE-2026-21510, a Windows Shell SmartScreen bypass with a CVSS score of 8.8.
Technical Details of the Exploit
The attack leverages the Windows Shell namespace parsing pipeline. APT28 embedded a malicious `LinkTargetIDList` structure within the LNK file, which Windows Explorer parses and renders similarly to Control Panel items. This IDList comprises three components:
1. A CLSID representing the Control Panel COM object.
2. An entry for all control panel items.
3. An `_IDCONTROLW` structure containing a UNC path pointing to the attacker’s remote server.
When `explorer.exe` processes this LNK file, it resolves the malicious path as:
“`
text::{26EE0668-A00A-44D7-9371-BEB064C98683}\0\{GENERATED GUID OF THE UNC PATH}
“`
This resolution prompts Windows to load a DLL from the attacker’s server, treating it as a Control Panel (CPL) component without triggering SmartScreen or Mark of the Web (MotW) verification.
Microsoft’s Response and Patch Analysis
In February 2026, Microsoft addressed CVE-2026-21510 by introducing a new COM object called `ControlPanelLinkSite`. This object bridges the CPL launch path with ShellExecute’s trust verification pipeline. The patch added a new `fMask` bit (`0x08000000`) that forces ShellExecute to query `IVerifyingTrust`, triggering SmartScreen verification of the CPL file’s digital signature and origin zone before execution.
Akamai’s analysis confirmed that this fix effectively blocked the remote code execution vector, preventing unsigned or remote CPLs from executing silently.
Persistence of the Vulnerability
Despite the patch, Akamai researchers discovered that victim machines continued to authenticate to the attacker’s server. The trust verification introduced by Microsoft occurs during the `ShellExecuteExW` call at the end of the CPL launch chain. However, an earlier trigger exists in `CControlPanelFolder::GetUIObjectOf`, a function called by Windows Explorer to extract an icon for the CPL IDList item when rendering a folder’s contents.
Within this chain, a `PathFileExistsW` call in `GetModuleMapped` causes Windows to resolve the UNC path and initiate an SMB connection to the attacker’s server as soon as a folder containing the malicious LNK file is opened—without any user interaction.
Implications and Recommendations
This vulnerability underscores the sophistication of state-sponsored cyberattacks and the challenges in fully mitigating such threats. Users and administrators are advised to:
– Apply Security Updates Promptly: Ensure all systems are updated with the latest patches from Microsoft to address known vulnerabilities.
– Exercise Caution with LNK Files: Be vigilant when handling shortcut files, especially those from untrusted sources.
– Monitor Network Traffic: Implement monitoring solutions to detect unusual SMB connections that could indicate exploitation attempts.
By staying informed and proactive, organizations can better defend against sophisticated cyber threats exploiting zero-click vulnerabilities.