Description
Git for Windows is the Windows port of Git. Versions prior to 2.53.0.windows.3 do not have protections that prevent attackers from obtaining a user's NTLM hash. The NTLM hash can be obtained by tricking users into cloning a malicious repository, or checking out a malicious branch, that accesses an attacker-controlled server. By default, NTLM authentication does not need any user interaction. By brute-forcing the NTLMv2 hash (which is expensive, but possible), credentials can be extracted. This issue has been fixed in version 2.53.0.windows.3.
INFO
Published Date :
2026-04-15T17:26:44.154Z
Last Modified :
2026-04-15T18:44:04.155Z
Source :
GitHub_M
AFFECTED PRODUCTS
The following products are affected by CVE-2026-32631 vulnerability.
| Vendors | Products |
|---|---|
| Gitforwindows |
|
REFERENCES
Here, you will find a curated list of external links that provide in-depth information to CVE-2026-32631.