Home Microsoft CVE-2025-66413
Back to Microsoft

CVE-2025-66413

Git for Windows

Microsoft CVSS 7.4 Updated March 15, 2026

Executive Risk Summary

"A vulnerability in Git for Windows prior to version 2.53.0(2) allows an attacker to obtain a user's NTLM hash by tricking them into cloning from a malicious server, potentially leading to brute-force attacks on the user's account name and password. This vulnerability is fixed in version 2.53.0(2) of Git for Windows."

Operational Audit Arsenal

Target Type Executable
Target Asset git.exe
Standard Path %ProgramFiles%\Git\bin
PowerShell
# 🛠️ Senior Engineer Universal Audit
# Target: git.exe (Executable)
$Target = "git.exe"
$SearchPaths = @("$env:windir\System32", "$env:ProgramFiles", "${env:ProgramFiles(x86)}")

Get-ChildItem -Path $SearchPaths -Filter $Target -Recurse -ErrorAction SilentlyContinue | 
Select-Object FullName, @{Name="Version";Expression={$_.VersionInfo.ProductVersion}}

Patch Impact Forecast

Reboot Required Unlikely
Service Disruption

Git services

Internal Work Notes

Update Git for Windows to version 2.53.0(2) or later to mitigate NTLM hash vulnerability

Intelligence Sources

Scope of Impact

Original NVD Description

"Git for Windows is the Windows port of Git. Prior to 2.53.0(2), it is possible to obtain a user's NTLM hash by tricking them into cloning from a malicious server. Since NTLM hashing is weak, it is possible for the attacker to brute-force the user's account name and password. This vulnerability is fixed in 2.53.0(2)."

Data compiled from NVD, MSRC, and CISA KEV Catalog. Intelligence synthesized via AI. Scripts for diagnostic purposes under MIT License.