V
Scaner-VSvulnerability catalog · v4.2
CVE-2026-21510
MSR
High KEVConfirmedExploit available

Protection mechanism failure in Windows Shell allows an unauthorized attacker to bypass a security feature over a network.

CVSS
8.8
High
EPSS
0.04
p87
Published
2026-01-01
Updated
2026-02-10
Description

Protection mechanism failure in Windows Shell allows an unauthorized attacker to bypass a security feature over a network.

Tags · CWE
KEVPre-auth
CWE-693
CAPEC-1
CAPEC-17
CAPEC-20
CAPEC-22
CAPEC-36
CAPEC-51
CAPEC-57
CAPEC-59
CAPEC-65
CAPEC-74
CAPEC-87
CAPEC-107
CAPEC-127
CAPEC-237
CAPEC-477
CAPEC-480
CAPEC-668
Affected products
Windows_10_1607 < 10.0.14393.8868Windows_10_1809 < 10.0.17763.8389Windows_10_21h2 < 10.0.19044.6937Windows_10_22h2 < 10.0.19045.6937Windows_11_23h2 < 10.0.22631.6649Windows_11_24h2 < 10.0.26100.7781Windows_11_25h2 < 10.0.26200.7781Windows_server_2012Windows_server_2016 < 10.0.14393.8868Windows_server_2019 < 10.0.17763.8389Windows_server_2022 < 10.0.20348.4711Windows_server_2022_23h2 < 10.0.25398.2149Windows_server_2025 < 10.0.26100.32313
CVSS vector
CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H
Timeline
2026-01-01
Published
2026-02-10
Added to KEV
2026-02-10
Updated
CVSS 3.1 breakdown
Attack Vector
AV: N
Network (N)
Attack Complexity
AC: L
Low (L)
Privileges Required
PR: N
None (N)
User Interaction
UI: R
Required (R)
Scope
S: U
Unchanged (U)
Confidentiality Impact
C: H
High (H)
Integrity Impact
I: H
High (H)
Availability Impact
A: H
High (H)
Exploit indicators
EPSS
0.035 · p87
Known exploited (KEV)
Yes
MITRE ATT&CK
Inferred via CAPEC
└ via CAPEC-57 · CWE-693
└ via CAPEC-127 · CWE-693
└ via CAPEC-668 · CWE-693
└ via CAPEC-480 · CWE-693
Known exploits — Сканер-ВС
CVE-2026-21510
github-poc · https://github.com/andreassudo/CVE-2026-21510-CVSS-8.8-Important-Windows-Shell-security-feature-bypass
Enterprise
Affected software
ProductVendorStatus
windows_10_1607*Exploited
windows_10_1809*Exploited
windows_10_21h2*Exploited
windows_10_22h2*Exploited
windows_11_23h2*Exploited
windows_11_24h2*Exploited
windows_11_25h2*Exploited
windows_server_2012*Exploited
windows_server_2016*Exploited
windows_server_2019*Exploited
windows_server_2022*Exploited
windows_server_2022_23h2*Exploited
windows_server_2025*Exploited
WindowsMicrosoftExploited
WindowsMicrosoftExploited
WindowsMicrosoftExploited
WindowsMicrosoftExploited
WindowsMicrosoftExploited
WindowsMicrosoftExploited
WindowsMicrosoftExploited