NTLM Hash Exposure in Git for Windows
CVE-2026-32631
7.4HIGH
What is CVE-2026-32631?
Git for Windows, the Windows port of Git, is vulnerable to unauthorized NTLM hash exposure due to insufficient protections in versions before 2.53.0.windows.3. This vulnerability allows attackers to exploit users by tricking them into cloning compromised repositories or checking out malicious branches. The exploit leverages NTLM authentication, which operates without user interaction, potentially enabling the extraction of user credentials through brute-force attacks on the NTLMv2 hash. Users are strongly advised to upgrade to version 2.53.0.windows.3 to mitigate this security risk.
Affected Version(s)
git < 2.53.0.windows.3
