Skip to content
  • Home
  • Cyber Map
  • About Us – Contact
  • Disclaimer
  • Terms and Rules
  • Privacy Policy
Cyber Web Spider Blog – News

Cyber Web Spider Blog – News

Globe Threat Map provides a real-time, interactive 3D visualization of global cyber threats. Monitor DDoS attacks, malware, and hacking attempts with geo-located arcs on a rotating globe. Stay informed with live logs and archive stats.

  • Home
  • Cyber Map
  • Cyber Security News
  • Security Week News
  • The Hacker News
  • How To?
  • Toggle search form
Exploit Targets Windows Snipping Tool Vulnerability

Exploit Targets Windows Snipping Tool Vulnerability

Posted on April 21, 2026 By CWS

A newly discovered vulnerability in Microsoft’s Snipping Tool, identified as CVE-2026-33829, exposes users to potential Net-NTLM credential hash theft. Security experts from Black Arrow disclosed this issue, which allows cyber attackers to exploit the application’s handling of deep link URI registrations via the ms-screensketch protocol schema.

Understanding the Vulnerability

The flaw affects Windows Snipping Tool versions that improperly validate input when registering deep links. Attackers can exploit this by providing a UNC path that directs to a remote, malicious SMB server. This manipulation forces an authenticated SMB connection, capturing the victim’s Net-NTLM hash in the process.

Black Arrow’s security team discovered the vulnerability and worked with Microsoft to address it before sharing it publicly. The PoC exploit they released demonstrates the ease with which attackers can lure users to malicious URLs, subsequently triggering the Snipping Tool to connect to an attacker-controlled server.

Exploitation and Risks

Executing this exploit requires minimal technical know-how. By hosting a malicious URL or an HTML page that auto-triggers the deep link, attackers can deceive users into visiting it. During this process, the Snipping Tool attempts to load a remote resource, sending the user’s Net-NTLM authentication response to the attacker’s server, which can be used to crack credentials or facilitate NTLM relay attacks.

This vulnerability is particularly dangerous due to its potential for social engineering. The Snipping Tool opens upon exploitation, making the attack appear legitimate, such as an invitation to edit an image or document. This deception is especially effective in corporate settings where phishing emails often mimic internal communication.

Patch and Security Recommendations

Microsoft released a patch for this vulnerability on April 14, 2026, as part of its regular Patch Tuesday updates. It is crucial for organizations and users with affected versions to implement this update immediately to mitigate risks.

Security teams should also monitor network traffic for unusual outbound SMB connections to unknown hosts, which could signal exploitation attempts. Blocking outbound SMB traffic at the network perimeter is a recommended preventive measure.

Stay informed on cybersecurity developments by following us on Google News, LinkedIn, and X. To share your cybersecurity stories, don’t hesitate to reach out.

Cyber Security News Tags:credential theft, CVE-2026-33829, Cybersecurity, Microsoft patch, NTLM exploit, PoC exploit, SMB attack, Snipping Tool, social engineering, Windows vulnerability

Post navigation

Previous Post: Anthropic MCP Flaw Exposes Millions to Cyber Threats
Next Post: Critical iTerm2 SSH Flaw Found: Text to Code Execution

Related Posts

TARmageddon Vulnerability In Rust Library Let Attackers Replace Config Files And Execute Remote Codes TARmageddon Vulnerability In Rust Library Let Attackers Replace Config Files And Execute Remote Codes Cyber Security News
New Phishing Attack Bypasses Using UUIDs Unique to Bypass Secure Email Gateways New Phishing Attack Bypasses Using UUIDs Unique to Bypass Secure Email Gateways Cyber Security News
Threat Actors Leveraging Foxit PDF Reader to Gain System Control and Steal Sensitive Data Threat Actors Leveraging Foxit PDF Reader to Gain System Control and Steal Sensitive Data Cyber Security News
Qilin Ransomware Surging Following The Fall of dominant RansomHub RaaS Qilin Ransomware Surging Following The Fall of dominant RansomHub RaaS Cyber Security News
11 Best SysAdmin Tools – 2025 11 Best SysAdmin Tools – 2025 Cyber Security News
PoC Exploit Released for Critical NVIDIA AI Container Toolkit Vulnerability PoC Exploit Released for Critical NVIDIA AI Container Toolkit Vulnerability Cyber Security News

Categories

  • Cyber Security News
  • How To?
  • Security Week News
  • The Hacker News

Recent Posts

  • Critical iTerm2 SSH Flaw Found: Text to Code Execution
  • Exploit Targets Windows Snipping Tool Vulnerability
  • Anthropic MCP Flaw Exposes Millions to Cyber Threats
  • Microsoft Teams Outage: Desktop Client Update Rollback Efforts
  • JanaWare Ransomware Targets Turkish Users with Adwind RAT

Pages

  • About Us – Contact
  • Disclaimer
  • Privacy Policy
  • Terms and Rules

Archives

  • April 2026
  • March 2026
  • February 2026
  • January 2026
  • December 2025
  • November 2025
  • October 2025
  • September 2025
  • August 2025
  • July 2025
  • June 2025
  • May 2025

Recent Posts

  • Critical iTerm2 SSH Flaw Found: Text to Code Execution
  • Exploit Targets Windows Snipping Tool Vulnerability
  • Anthropic MCP Flaw Exposes Millions to Cyber Threats
  • Microsoft Teams Outage: Desktop Client Update Rollback Efforts
  • JanaWare Ransomware Targets Turkish Users with Adwind RAT

Pages

  • About Us – Contact
  • Disclaimer
  • Privacy Policy
  • Terms and Rules

Categories

  • Cyber Security News
  • How To?
  • Security Week News
  • The Hacker News

Copyright © 2026 Cyber Web Spider Blog – News.

Powered by PressBook Masonry Dark