Git for Windows is the Windows port of Git. Versions prior to 2.53.0.windows.3 do not have protections that prevent attackers from obtaining a user's NTLM hash. The NTLM hash can be obtained by tricking users into cloning a malicious repository, or checking out a malicious branch, that accesses an attacker-controlled server. By default, NTLM authentication does not need any user interaction. By brute-forcing the NTLMv2 hash (which is expensive, but possible), credentials can be extracted. This issue has been fixed in version 2.53.0.windows.3.
https://thehackernews.com/2026/04/microsoft-issues-patches-for-sharepoint.html
https://learn.microsoft.com/en-au/windows/whats-new/deprecated-features#:~:text=NTLM
https://github.com/git-for-windows/git/security/advisories/GHSA-9j5h-h4m7-85hx
https://github.com/git-for-windows/git/releases/tag/v2.53.0.windows.3