This post has been republished via RSS; it originally appeared at: MSRC Security Update Guide.
[CVE-2026-32631](https://www.cve.org/CVERecord?id=CVE-2026-32631) is regarding a vulnerability where it is possible to obtain a user's NTLM hash by tricking them into cloning a malicious repository, or checking out a malicious branch that accesses an attacker-controlled server. By default, NTLM authentication does not need any user interaction. GitHub created this CVE on their behalf. The documented Visual Studio updates incorporate updates in Git which address this vulnerability. Please see [CVE-2026-32631](https://www.cve.org/CVERecord?id=CVE-2026-32631) for more information.