APT28's Zero-Day Got a Patch — Then Researchers Found It Left a Zero-Click Hole Open

Share
Cracked Windows logo overlapping a split security shield with a broken padlock, representing an incomplete Microsoft patch that left a zero-click credential theft vulnerability open.

Microsoft's February patch for a Windows zero-day actively exploited by Russia's APT28 blocked the remote code execution path — but left behind a zero-click authentication coercion flaw. Akamai researchers found it while testing the fix. That flaw is now CVE-2026-32202, confirmed exploited in the wild, and added to CISA's KEV catalog.

WASHINGTON, D.C. — When Microsoft patched CVE-2026-21510 in February 2026 — a Windows Shell vulnerability confirmed exploited by Russia's APT28 (Fancy Bear) in attacks against Ukraine and EU countries — researchers at Akamai ran a patch differential analysis to verify the fix held. It did not fully hold. While the remote code execution path was closed, the February patch left the victim machine still authenticating to the attacker's server under certain conditions, creating a zero-click credential theft vector. Akamai disclosed the residual flaw to Microsoft under responsible disclosure, which issued a fix in the April 2026 Patch Tuesday cycle as CVE-2026-32202. Within days, Microsoft marked it as exploited in the wild, and CISA added it to the Known Exploited Vulnerabilities catalog on April 28, 2026.

Vulnerability Chain Overview
Field Details
Original CVECVE-2026-21510 — Windows Shell security feature bypass; exploited by APT28 in LNK-based attacks on Ukraine and EU countries (December 2025)
Chained CVECVE-2026-21513 — MSHTML security feature bypass; chained with CVE-2026-21510 in the same weaponized LNK file
February PatchMicrosoft patched CVE-2026-21510 and CVE-2026-21513 in February 2026 Patch Tuesday — closed the RCE and SmartScreen bypass path
Residual FlawCVE-2026-32202 — victim machine continued authenticating to attacker's server; zero-click Net-NTLMv2 hash theft via auto-parsed LNK files
CVSS Score4.3 Medium — low complexity, network attack vector, no user interaction required
April FixPatched in April 2026 Patch Tuesday; marked exploited in wild on April 27; added to CISA KEV April 28
Federal DeadlineMay 12, 2026 — FCEB agencies required to patch under BOD 22-01

What Happened

The Original APT28 Exploit Chain

According to Ukraine's CERT-UA, APT28 — the GRU-linked Russian threat group also tracked as Fancy Bear and Forest Blizzard — launched a cyberattack campaign targeting Ukraine and several EU countries beginning in December 2025. The campaign used weaponized LNK shortcut files delivered via phishing emails purporting to be from Ukraine's hydro-meteorological center. The LNK files chained two vulnerabilities: CVE-2026-21513, an MSHTML security feature bypass, and CVE-2026-21510, a Windows Shell flaw. Together they allowed the attackers to bypass Microsoft Defender SmartScreen and remotely execute attacker-controlled code stored on a remote server — without the victim needing to do anything beyond opening the shortcut file.

Microsoft patched both CVEs in the February 2026 Patch Tuesday cycle, flagging CVE-2026-21510 as exploited in the wild at the time of disclosure. Akamai, which had detected the APT28 exploitation in January 2026, deliberately withheld details of a second issue in the chain it had identified during patch analysis — to allow responsible disclosure to proceed.

The Incomplete Fix

When Akamai senior security researcher Maor Dahan used PatchDiff-AI to analyze the February patches, something unexpected appeared. While the RCE and SmartScreen bypass paths were closed — Microsoft had enforced SmartScreen scanning of CPL files loaded via the shell namespace parsing mechanism — the victim machine was still authenticating to the attacker's server. As Dahan described it: "The victim machine was still authenticating to the attacker's server." The gap existed between path resolution and trust verification. The Windows Shell parser resolved the LNK file's UNC path before the trust verification step fired, meaning the authentication handshake had already occurred before SmartScreen could intervene. This left a zero-click Net-NTLMv2 hash exfiltration vector intact even after the February patch was applied.

Akamai disclosed the residual flaw to Microsoft. The result was CVE-2026-32202, patched in April 2026. This is now the second consecutive month in which an incomplete Windows patch has spawned a new actively exploited CVE — a pattern worth tracking. The April 2026 Patch Tuesday cycle also addressed CVE-2026-32202 alongside 166 other vulnerabilities, including a separately disclosed SharePoint zero-day.

Scope and Impact

CVE-2026-32202 allows an unauthenticated attacker to steal a victim's Net-NTLMv2 authentication hash via a malicious LNK file — with no user interaction required beyond the file being parsed by Windows Shell. The stolen hash can then be used in pass-the-hash or relay attacks to authenticate as the victim, access sensitive network resources, and pivot laterally across enterprise environments. As previously reported, CISA added CVE-2026-32202 to its KEV catalog on April 28 alongside the ConnectWise ScreenConnect flaw, setting a May 12 federal remediation deadline.

The attack vector is network-based with no privilege requirement and no user interaction, placing it in a category of particular concern for enterprise Windows environments where users routinely process files from network shares, email attachments, or downloaded archives — all of which can contain LNK files. Privileged user workstations carry the highest risk, as credential theft from an administrator account enables domain-level lateral movement.

Attack Timeline
Date Event
December 2025APT28 begins exploiting CVE-2026-21510 + CVE-2026-21513 chain against Ukraine and EU countries
January 2026Akamai detects the APT28 exploitation chain
February 2026Microsoft patches CVE-2026-21510 and CVE-2026-21513 in Patch Tuesday; Akamai discovers incomplete fix during patch differential analysis
April 14, 2026Microsoft patches CVE-2026-32202 in April Patch Tuesday
April 27, 2026Microsoft marks CVE-2026-32202 as exploited in the wild
April 28, 2026CISA adds CVE-2026-32202 to KEV catalog; May 12 federal remediation deadline set

Response and Attribution

Microsoft has released a fix for CVE-2026-32202 as part of the April 2026 Patch Tuesday cycle. Administrators should ensure April cumulative updates have been applied to all supported Windows versions. Microsoft has not detailed the specific actors observed exploiting CVE-2026-32202, but Akamai's analysis notes that given the vulnerability's origin — an incomplete patch for a CVE actively exploited by APT28 — the same or affiliated actors are the most likely operators of in-the-wild exploitation.

Akamai's full technical write-up, including the root cause analysis, patch differential methodology, and exploitation flow diagram, is publicly available. For organizations that have not yet applied April Patch Tuesday updates, this should be treated as an active incident risk rather than a scheduled maintenance item.

The CyberSignal Analysis

Signal 01 — Incomplete Patches Are a Pattern, Not an Anomaly

The emergence of CVE-2026-32202 from an incomplete fix for CVE-2026-21510 reflects a structural challenge in modern patch development: complex attack chains involving multiple components can be partially mitigated while leaving adjacent attack surfaces open. This is the second consecutive month where a Microsoft patch has generated a follow-on exploited CVE. Security teams should build patch validation into their processes — not just applying updates, but verifying through independent analysis that the exploited attack path has been fully closed. Understanding how advanced persistent threats operate helps teams understand why partial mitigations are insufficient against patient, well-resourced adversaries.

Signal 02 — Zero-Click Credential Theft Demands Priority Treatment

The zero-click nature of CVE-2026-32202 places it in a higher practical risk tier than its CVSS 4.3 Medium score suggests. No user interaction means no training, awareness, or behavioral control can mitigate this vulnerability — only patching does. Net-NTLMv2 relay attacks using stolen hashes are a well-understood and frequently used lateral movement technique. An unpatched Windows endpoint with a privileged user account is a direct path from initial file delivery to domain-level compromise.

Signal 03 — APT28 Is Actively Probing Windows LNK Handling

The consistency of APT28's focus on Windows Shell LNK file parsing — across CVE-2026-21510, CVE-2026-21513, and the conditions that produced CVE-2026-32202 — suggests this attack surface remains a productive hunting ground for Russian intelligence. Organizations with geopolitical exposure to Russian state-sponsored activity, particularly those operating in NATO member states, EU institutions, or defense supply chains, should treat any incomplete patching of LNK-related vulnerabilities as a priority escalation. Russia's escalating campaign against European targets makes this threat landscape directly relevant to a broad enterprise audience.


Sources

Type Source
ResearchAkamai — A Shortcut to Coercion: Incomplete Patch of APT28's Zero-Day
ReportingThe Register — Microsoft Patch Fell Short, New Windows Flaw Exploited
ReportingSecurityWeek — Incomplete Windows Patch Opens Door to Zero-Click Attacks
OfficialCISA Known Exploited Vulnerabilities Catalog
ReportingBleepingComputer — Microsoft April 2026 Patch Tuesday

Read more