Description

Git for Windows is the Windows port of Git. Versions prior to 2.53.0.windows.3 do not have protections that prevent attackers from obtaining a user's NTLM hash. The NTLM hash can be obtained by tricking users into cloning a malicious repository, or checking out a malicious branch, that accesses an attacker-controlled server. By default, NTLM authentication does not need any user interaction. By brute-forcing the NTLMv2 hash (which is expensive, but possible), credentials can be extracted. This issue has been fixed in version 2.53.0.windows.3.

INFO

Published Date :

2026-04-15T17:26:44.154Z

Last Modified :

2026-04-15T18:44:04.155Z

Source :

GitHub_M
AFFECTED PRODUCTS

The following products are affected by CVE-2026-32631 vulnerability.

Vendors Products
Gitforwindows
  • Git

CVSS Vulnerability Scoring System

Detailed values of each vector for above chart.
Attack Vector
Attack Complexity
Privileges Required
User Interaction
Scope
Confidentiality Impact
Integrity Impact
Availability Impact