Skip to content
  • Home
  • Cyber Map
  • About Us – Contact
  • Disclaimer
  • Terms and Rules
  • Privacy Policy
Cyber Web Spider Blog – News

Cyber Web Spider Blog – News

Globe Threat Map provides a real-time, interactive 3D visualization of global cyber threats. Monitor DDoS attacks, malware, and hacking attempts with geo-located arcs on a rotating globe. Stay informed with live logs and archive stats.

  • Home
  • Cyber Map
  • Cyber Security News
  • Security Week News
  • The Hacker News
  • How To?
  • Toggle search form
Exploit Targets Windows Snipping Tool Vulnerability

Exploit Targets Windows Snipping Tool Vulnerability

Posted on April 21, 2026 By CWS

A newly discovered vulnerability in Microsoft’s Snipping Tool, identified as CVE-2026-33829, exposes users to potential Net-NTLM credential hash theft. Security experts from Black Arrow disclosed this issue, which allows cyber attackers to exploit the application’s handling of deep link URI registrations via the ms-screensketch protocol schema.

Understanding the Vulnerability

The flaw affects Windows Snipping Tool versions that improperly validate input when registering deep links. Attackers can exploit this by providing a UNC path that directs to a remote, malicious SMB server. This manipulation forces an authenticated SMB connection, capturing the victim’s Net-NTLM hash in the process.

Black Arrow’s security team discovered the vulnerability and worked with Microsoft to address it before sharing it publicly. The PoC exploit they released demonstrates the ease with which attackers can lure users to malicious URLs, subsequently triggering the Snipping Tool to connect to an attacker-controlled server.

Exploitation and Risks

Executing this exploit requires minimal technical know-how. By hosting a malicious URL or an HTML page that auto-triggers the deep link, attackers can deceive users into visiting it. During this process, the Snipping Tool attempts to load a remote resource, sending the user’s Net-NTLM authentication response to the attacker’s server, which can be used to crack credentials or facilitate NTLM relay attacks.

This vulnerability is particularly dangerous due to its potential for social engineering. The Snipping Tool opens upon exploitation, making the attack appear legitimate, such as an invitation to edit an image or document. This deception is especially effective in corporate settings where phishing emails often mimic internal communication.

Patch and Security Recommendations

Microsoft released a patch for this vulnerability on April 14, 2026, as part of its regular Patch Tuesday updates. It is crucial for organizations and users with affected versions to implement this update immediately to mitigate risks.

Security teams should also monitor network traffic for unusual outbound SMB connections to unknown hosts, which could signal exploitation attempts. Blocking outbound SMB traffic at the network perimeter is a recommended preventive measure.

Stay informed on cybersecurity developments by following us on Google News, LinkedIn, and X. To share your cybersecurity stories, don’t hesitate to reach out.

Cyber Security News Tags:credential theft, CVE-2026-33829, Cybersecurity, Microsoft patch, NTLM exploit, PoC exploit, SMB attack, Snipping Tool, social engineering, Windows vulnerability

Post navigation

Previous Post: Anthropic MCP Flaw Exposes Millions to Cyber Threats
Next Post: Critical iTerm2 SSH Flaw Found: Text to Code Execution

Related Posts

Zoom Rooms for Windows and macOS Flaws Enable Privilege Escalation and Sensitive Data Leaks Zoom Rooms for Windows and macOS Flaws Enable Privilege Escalation and Sensitive Data Leaks Cyber Security News
G_Wagon npm Package Attacking Users to Exfiltrates Browser Credentials using Obfuscated Payload G_Wagon npm Package Attacking Users to Exfiltrates Browser Credentials using Obfuscated Payload Cyber Security News
Arcane Werewolf Hacker Group Added Loki 2.1 Malware Toolkit to their Arsenal Arcane Werewolf Hacker Group Added Loki 2.1 Malware Toolkit to their Arsenal Cyber Security News
CISA Alerts on Exploited Microsoft Vulnerabilities CISA Alerts on Exploited Microsoft Vulnerabilities Cyber Security News
VOIP-Based Botnet Attacking Routers Configured With Default Password VOIP-Based Botnet Attacking Routers Configured With Default Password Cyber Security News
CrowdStrike Fires Insider for Sharing Internal System Details with Hackers CrowdStrike Fires Insider for Sharing Internal System Details with Hackers Cyber Security News

Categories

  • Cyber Security News
  • How To?
  • Security Week News
  • The Hacker News

Recent Posts

  • CISA Highlights New Vulnerabilities, Sets Federal Deadlines
  • Gardyn Smart Garden Flaws Risk Remote Control by Hackers
  • British Hacker Admits to Stealing Millions in Cryptocurrency
  • Critical iTerm2 SSH Flaw Found: Text to Code Execution
  • Exploit Targets Windows Snipping Tool Vulnerability

Pages

  • About Us – Contact
  • Disclaimer
  • Privacy Policy
  • Terms and Rules

Archives

  • April 2026
  • March 2026
  • February 2026
  • January 2026
  • December 2025
  • November 2025
  • October 2025
  • September 2025
  • August 2025
  • July 2025
  • June 2025
  • May 2025

Recent Posts

  • CISA Highlights New Vulnerabilities, Sets Federal Deadlines
  • Gardyn Smart Garden Flaws Risk Remote Control by Hackers
  • British Hacker Admits to Stealing Millions in Cryptocurrency
  • Critical iTerm2 SSH Flaw Found: Text to Code Execution
  • Exploit Targets Windows Snipping Tool Vulnerability

Pages

  • About Us – Contact
  • Disclaimer
  • Privacy Policy
  • Terms and Rules

Categories

  • Cyber Security News
  • How To?
  • Security Week News
  • The Hacker News

Copyright © 2026 Cyber Web Spider Blog – News.

Powered by PressBook Masonry Dark