A newly disclosed vulnerability in Microsoft Windows Snipping Tool has raised serious cybersecurity concerns after researchers released a proof-of-concept (PoC) exploit demonstrating how attackers can silently extract sensitive authentication data. Specifically, this flaw enables threat actors to capture users’ Net-NTLM credential hashes simply by tricking them into visiting a malicious webpage.

The vulnerability, tracked as CVE-2026-33829, originates from improper handling of deep link URI registrations using the ms-screensketch protocol. Notably, affected versions of the Snipping Tool accept a filePath parameter without implementing sufficient input validation. As a result, attackers can inject a malicious UNC path that points to a remote SMB server under their control.

Consequently, when the application processes this crafted input, it initiates an authenticated SMB connection. During this interaction, Windows automatically transmits the user’s Net-NTLM hash to the attacker’s server. This data can then be cracked offline or leveraged in NTLM relay attacks, potentially allowing unauthorized access to internal systems.

The issue was initially identified and responsibly disclosed by researchers at Black Arrow Security, who coordinated with Microsoft before making the details public. Shortly after disclosure, they released a PoC to demonstrate the simplicity and effectiveness of the exploit.

Moreover, exploitation requires minimal technical expertise. An attacker only needs to host a malicious URL or embed the exploit within an HTML page that automatically triggers the deep link. Once a target visits the page, the Snipping Tool launches and silently attempts to fetch a remote resource via SMB, thereby exposing authentication credentials without any visible warning.

Importantly, this vulnerability poses a heightened risk due to its seamless integration into social engineering campaigns. Because the Snipping Tool visibly opens during the attack, it creates a convincing illusion of legitimacy. For instance, attackers can craft scenarios such as requesting employees to edit images, crop corporate assets, or review internal documents.

Furthermore, attackers may register deceptive domains like snip.example.com to enhance credibility. These domains can host seemingly harmless image links that, in reality, deliver the malicious payload in the background. As a result, victims remain unaware while the attack executes silently.

This technique proves particularly effective in enterprise environments, where phishing emails often mimic internal communications such as HR requests, IT support tickets, or shared document workflows. Therefore, organizations must remain vigilant and adopt stronger security controls to mitigate such risks.

Recommended Cyber Technology News:

To participate in our interviews, please write to our CyberTech Media Room at info@intentamplify.com  



🔒 Login or Register to continue reading