Home Microsoft CVE-2024-50338
Back to Microsoft

CVE-2024-50338

Git Credential Manager (GCM) - .NET

Microsoft CVSS 7.4 Updated March 15, 2026

Executive Risk Summary

"A vulnerability in Git Credential Manager (GCM) allows an attacker to capture credentials for another Git remote by crafting a malicious remote URL, potentially leading to unauthorized access. The issue is patched in version 2.6.1, and users are advised to upgrade or only interact with trusted remote repositories."

Operational Audit Arsenal

Target Type Executable
Target Asset git-credential-manager.exe
Standard Path %PROGRAMFILES%\Git\mingw64\libexec\git-core\git-credential-manager.exe
PowerShell
# 🛠️ Senior Engineer Universal Audit
# Target: git-credential-manager.exe (Executable)
$Targets = 'git-credential-manager.exe'
$SearchPaths = @("$env:windir\System32", "$env:ProgramFiles", "${env:ProgramFiles(x86)}")

Get-ChildItem -Path $SearchPaths -Include $Targets -Recurse -ErrorAction SilentlyContinue | 
Select-Object FullName, @{Name="Version";Expression={$_.VersionInfo.ProductVersion}}

Patch Impact Forecast

Reboot Required Unlikely

Git operations may be affected during the upgrade process

Internal Work Notes

CVE-2024-50338: Git Credential Manager vulnerability allowing credential capture, patched in version 2.6.1

Technical Intelligence & Operational Utilities • Delivered Weekly

Intelligence Sources

Related Microsoft Threats

Data compiled from NVD, MSRC, and CISA KEV Catalog. Intelligence synthesized via AI. Scripts provided for diagnostic purposes under MIT License.