Git for Windows NTLM Hash Leak Poses Credential Risk

Git for Windows NTLM Hash Leak Poses Credential Risk

A notable vulnerability, tracked as CVE-2026-32631, has been identified in Git for Windows. According to the National Vulnerability Database, versions prior to 2.53.0.windows.3 lack critical protections against NTLM hash exposure. This isn’t just a theoretical flaw; an attacker can exploit this by enticing users to clone a malicious repository or check out a compromised branch. The kicker? NTLM authentication typically requires no user interaction, making this a stealthy attack vector.

The National Vulnerability Database highlights that once an NTLM hash is obtained, it opens the door to offline brute-forcing. While NTLMv2 hashes are computationally expensive to crack, it’s far from impossible for a determined adversary. Successful cracking means credentials are laid bare, potentially leading to broader network compromise. This vulnerability, rated 7.4 (High Severity) on the CVSS scale, underscores the persistent risk associated with NTLM and the need for robust controls around development tools.

Related ATT&CK Techniques

🛡️ Detection Rules

3 rules · 6 SIEM formats

3 auto-generated detection rules for this incident, mapped to MITRE ATT&CK. Available in Sigma, Splunk SPL, Sentinel KQL, Elastic Lucene, QRadar AQL, and Wazuh.

high T1078.004 Initial Access

Credential Abuse from Breached Vendor — CVE-2026-32631

✓ Sigma 🔒 Splunk SPL 🔒 Sentinel KQL 🔒 Elastic 🔒 QRadar AQL 🔒 Wazuh

Want this in your SIEM's native format? Get Splunk SPL, Sentinel KQL, Elastic, QRadar AQL, or Wazuh — ready to paste.

3 Sigma rules mapped to the ATT&CK techniques from this breach — pick your SIEM and get a ready-to-paste query.

Get All SIEM Formats →

Indicators of Compromise

IDTypeIndicator
CVE-2026-32631 Information Disclosure Git for Windows versions prior to 2.53.0.windows.3
CVE-2026-32631 Information Disclosure NTLM hash disclosure via malicious Git repository clone or branch checkout

Related Posts

Chrome V8 Type Confusion: Remote OOB Access Risk

CVE-2026-6363 — Type Confusion in V8 in Google Chrome prior to 147.0.7727.101 allowed a remote attacker to potentially perform out of bounds memory access via...

vulnerabilityCVEhigh-severitycwe-843
/HIGH /⚑ 2 IOCs

Chrome 'Use-After-Free' Bug: High Severity RCE Risk

CVE-2026-6360 — Use after free in FileSystem in Google Chrome prior to 147.0.7727.101 allowed a remote attacker to potentially exploit object corruption via a crafted...

vulnerabilityCVEhigh-severityuse-after-freecwe-416
/HIGH /⚑ 3 IOCs

Chrome Video Bug: Renderer Compromise Leads to High-Severity RCE

CVE-2026-6359 — Use after free in Video in Google Chrome on Windows prior to 147.0.7727.101 allowed a remote attacker who had compromised the renderer process...

vulnerabilityCVEhigh-severityuse-after-freecwe-416
/HIGH /⚑ 3 IOCs