Hackers News Hackers News
  • CyberSecurity News
  • Threats
  • Attacks
  • Vulnerabilities
  • Breaches
  • Comparisons

Social Media

Hackers News Hackers News
  • CyberSecurity News
  • Threats
  • Attacks
  • Vulnerabilities
  • Breaches
  • Comparisons
Search the Site
Popular Searches:
technology Amazon AI
Recent Posts
OpenClaw Chain Flaws Expose 245 Vulnerabilities Public
May 15, 2026
Gunra Ransomware RaaS Expands After Conti Locker Operations Shifting
May 15, 2026
Shai-Hulud Worm Steals Developer Secrets from GitHub Kubernetes
May 15, 2026
Home/CyberSecurity News/Windows Snipping Tool Flaw Enables Network Spoofing Attacks
CyberSecurity News

Windows Snipping Tool Flaw Enables Network Spoofing Attacks

Microsoft has patched a moderate-severity security flaw in the Windows Snipping Tool that could have allowed malicious actors to steal user credentials. Tracked as CVE-2026-33829, this spoofing...

David kimber
David kimber
April 17, 2026 2 Min Read
8 0

Microsoft has patched a moderate-severity security flaw in the Windows Snipping Tool that could have allowed malicious actors to steal user credentials.

Tracked as CVE-2026-33829, this spoofing vulnerability was officially patched during the April 14, 2026, security updates.

Discovered and reported by security researchers at Blackarrow (Tarlogic), the flaw highlights the ongoing risks associated with application URL handlers in Windows environments.

CVE-2026-33829 holds a CVSS 3.1 score of 4.3 and is classified as an exposure of sensitive information to unauthorized actors (CWE-200).

The vulnerability resides in how the Windows Snipping Tool processes deep links. Specifically, the application fails to validate input when handling the ms-screensketch URI schema properly.

According to the vulnerability disclosure provided by Microsoft and Blackarrow, an attacker can exploit this weakness to force an authenticated Server Message Block (SMB) connection to a remote, attacker-controlled server.

Spoofing Flaw Exposes Snipping Tool

While the exploit requires user interaction, the attack complexity is considered low. Here is how the attack chain operates based on the released proof-of-concept:

  • Malicious Link Creation: Attackers craft a specific web link using the ms-screensketch: edit parameter.
  • Deceptive Routing: The link points the filePath parameter to a malicious external SMB server.
  • User Interaction: The attacker tricks the victim into clicking a link in a phishing email or on a compromised website, prompting the user to confirm launching the Snipping Tool program.
  • Hash Theft: Once approved, Snipping Tool connects to the remote server to fetch the fake file, silently leaking the user’s NTLMv2 password hash in the background.
  • Unauthorized Access: The attacker captures this hash and can use it to authenticate as the compromised user on the network.

Security experts warn that this vulnerability is highly adaptable for social engineering campaigns. An attacker could send a legitimate-looking webpage asking a user to crop a corporate wallpaper or edit a badge photo.

While the Snipping Tool opens normally on the user’s screen, making the request appear harmless, NTLM authentication occurs invisibly.

Although successful exploitation results in a loss of confidentiality, it does not allow the attacker to alter data (Integrity) or crash the system (Availability).

Microsoft notes that the exploit code maturity is currently unproven, and actual exploitation remains “Unlikely.” There are no reports of it being exploited in the wild.

Affected Systems

The vulnerability, detailed on GitHub, impacts a wide range of Microsoft operating systems, including multiple versions of Windows 10, Windows 11, and Windows Server from 2012 through 2025.

To secure networks against CVE-2026-33829, organizations should implement the following mitigation strategies:

  • Immediately apply the official Microsoft security patches released on April 14, 2026.
  • Block outbound SMB traffic (Port 445) at the network perimeter to prevent NTLM hashes from communicating with external servers.
  • Educate employees about the dangers of clicking unknown links and unquestioningly approving application launch prompts from web browsers.

Disclaimer: HackersRadar reports on cybersecurity threats and incidents for informational and awareness purposes only. We do not engage in hacking activities, data exfiltration, or the hosting or distribution of stolen or leaked information. All content is based on publicly available sources.

Tags:

AttackCVEExploitPatchphishingSecurityVulnerability

Share Article

David kimber

David kimber

David is a penetration tester turned security journalist with expertise in mobile security, IoT vulnerabilities, and exploit development. As an OSCP-certified security professional, David brings hands-on technical experience to his reporting on vulnerabilities and security research. His articles often feature detailed technical analysis of exploits and provide actionable defense recommendations. David maintains an active presence in the security research community and has contributed to multiple open-source security tools.

Previous Post

Microsoft: Windows Servers Reboot Loop After April Patches

Next Post

Windows Defender 0-Day Actively Exploited Leaked Vulnerability

No Comment! Be the first one.

Leave a Reply Cancel reply

Your email address will not be published. Required fields are marked *

Popular Posts
OrBit Rootkit Steals SSH & Sudo Credentials from Hackers Harvest
May 15, 2026
Microsoft Warns: Attackers Use HPE Agent for Malware-
May 15, 2026
Tycoon 2FA Operators Use OAuth Phishing to Bypass Adopt Device
May 15, 2026
Top Authors
Marcus Rodriguez
Marcus Rodriguez
Jennifer sherman
Jennifer sherman
Sarah simpson
Sarah simpson
Let's Connect
156k
2.25m
285k

Related Posts

Jennifer sherman
By Jennifer sherman
Threats

GlassWorm Attacks macOS via Malicious VS Code…

January 1, 2026
Emy Elsamnoudy
By Emy Elsamnoudy
Attacks

ClickFix Attack Hides Malicious Code via Stegan Security

January 1, 2026
Sarah simpson
By Sarah simpson
Vulnerabilities

MongoBleed Detector Tool Detects Critical MongoDB CVE-

January 1, 2026
Emy Elsamnoudy
By Emy Elsamnoudy
Breaches

Conti Ransomware Gang Leaders & Infrastructure Exposed

January 1, 2026
Hackers News Hackers News
  • [email protected]

Quick Links

  • Contact Us
  • Privacy Policy
  • Terms of service

Categories

Attacks
Breaches
Comparisons
CyberSecurity News
Threats
Vulnerabilities

Let's keep in touch

receive fresh updates and breaking cyber news every day and week!

All Rights Reserved by HackersRadar ©2026

Follow Us