Skip to content
  • Home
  • Cyber Map
  • About Us – Contact
  • Disclaimer
  • Terms and Rules
  • Privacy Policy
Cyber Web Spider Blog – News

Cyber Web Spider Blog – News

Globe Threat Map provides a real-time, interactive 3D visualization of global cyber threats. Monitor DDoS attacks, malware, and hacking attempts with geo-located arcs on a rotating globe. Stay informed with live logs and archive stats.

  • Home
  • Cyber Map
  • Cyber Security News
  • Security Week News
  • The Hacker News
  • How To?
  • Toggle search form
Windows Snipping Tool Flaw Exposes User Credentials

Windows Snipping Tool Flaw Exposes User Credentials

Posted on April 17, 2026 By CWS

Microsoft has recently addressed a security flaw in its Windows Snipping Tool that poses a threat to user credentials. The vulnerability, known as CVE-2026-33829, was resolved in the security updates released on April 14, 2026. This issue brings attention to the ongoing vulnerabilities linked to application URL handlers in Windows systems.

Understanding the Vulnerability

Classified under CVSS 3.1 with a score of 4.3, CVE-2026-33829 is identified as an exposure of sensitive information to unauthorized entities (CWE-200). The flaw emerges from the way the Snipping Tool processes deep links, specifically due to improper input validation when managing the ms-screensketch URI schema.

This vulnerability allows an attacker to initiate an authenticated Server Message Block (SMB) connection to a remote server they control. Although this exploit necessitates user interaction, the attack complexity remains low. Researchers at Blackarrow (Tarlogic) were instrumental in discovering this flaw.

Attack Mechanism and Exploitation

The attack leverages a crafted web link utilizing the ms-screensketch: edit parameter, redirecting the filePath to a malicious SMB server. By deceiving users into clicking the link via phishing emails or compromised websites, attackers can activate the Snipping Tool, which then connects to the remote server.

During this process, the user’s NTLMv2 password hash is silently leaked, enabling the attacker to authenticate as the compromised user. Experts warn that this vulnerability is particularly exploitable through social engineering tactics, such as persuading users to edit images on seemingly legitimate websites.

Impact and Mitigation Strategies

Although the flaw compromises confidentiality, it does not affect data integrity or system availability. Microsoft has stated that the exploit’s code maturity is presently unproven, and actual exploitation is considered “unlikely.” To date, there have been no reports of this vulnerability being actively exploited in the wild.

The vulnerability affects several Microsoft operating systems, including various versions of Windows 10, Windows 11, and Windows Server from 2012 to 2025. Organizations are advised to apply the security patches issued by Microsoft without delay, block outbound SMB traffic on Port 445, and educate staff on the risks of engaging with unknown links or application prompts.

Stay updated with the latest in cybersecurity by following us on Google News, LinkedIn, and X. For more information or to share your stories, contact us today.

Cyber Security News Tags:Blackarrow, CVE-2026-33829, Cybersecurity, Microsoft, network security, Security, Snipping Tool, Spoofing, Vulnerability, Windows

Post navigation

Previous Post: Congressional Subcommittee Deliberates AI Risks and Opportunities
Next Post: Microsoft Defender Zero-Day Exploits Unpatched

Related Posts

CISA Warns of Apple iOS, iPadOS, and macOS 0-day Vulnerability Exploited in Attacks CISA Warns of Apple iOS, iPadOS, and macOS 0-day Vulnerability Exploited in Attacks Cyber Security News
SAP Security Update – Patch for Critical Vulnerabilities Allowing Code Execution and Injection Attacks SAP Security Update – Patch for Critical Vulnerabilities Allowing Code Execution and Injection Attacks Cyber Security News
Salesforce Confirms that Customers’ Data Was accessed Following the Gainsight Breach Salesforce Confirms that Customers’ Data Was accessed Following the Gainsight Breach Cyber Security News
IXON VPN Client Vulnerability Let Attackers Escalate Privileges IXON VPN Client Vulnerability Let Attackers Escalate Privileges Cyber Security News
PhantomVAI Loader Utilizes RunPE for Stealthy Attacks PhantomVAI Loader Utilizes RunPE for Stealthy Attacks Cyber Security News
ClayRat Android Malware Steals SMS Messages, Call Logs and Capture Victim Photos ClayRat Android Malware Steals SMS Messages, Call Logs and Capture Victim Photos Cyber Security News

Categories

  • Cyber Security News
  • How To?
  • Security Week News
  • The Hacker News

Recent Posts

  • Email Worms Target Industrial Control Systems Globally
  • North Korean Malware Targets macOS via Fake Zoom SDK Update
  • CoChat Introduces Platform to Manage Shadow AI Risks
  • CVE-2026-39987 Exploited to Deploy Blockchain Backdoor
  • US Sentences Two for North Korean IT Scheme Involvement

Pages

  • About Us – Contact
  • Disclaimer
  • Privacy Policy
  • Terms and Rules

Archives

  • April 2026
  • March 2026
  • February 2026
  • January 2026
  • December 2025
  • November 2025
  • October 2025
  • September 2025
  • August 2025
  • July 2025
  • June 2025
  • May 2025

Recent Posts

  • Email Worms Target Industrial Control Systems Globally
  • North Korean Malware Targets macOS via Fake Zoom SDK Update
  • CoChat Introduces Platform to Manage Shadow AI Risks
  • CVE-2026-39987 Exploited to Deploy Blockchain Backdoor
  • US Sentences Two for North Korean IT Scheme Involvement

Pages

  • About Us – Contact
  • Disclaimer
  • Privacy Policy
  • Terms and Rules

Categories

  • Cyber Security News
  • How To?
  • Security Week News
  • The Hacker News

Copyright © 2026 Cyber Web Spider Blog – News.

Powered by PressBook Masonry Dark