CRITICAL CVE-2024-32002 vulnerability in Microsoft Visual Studio 2019 Community at DESKTOP-FNUMV3U

RESOLVED SECURITY TESTING ID: #10 | Created: 2025-12-31 14:01:02
1
Alerts
0
Hosts
0
Files
0
Network
Incident Overview

Git is a revision control system. Prior to versions 2.45.1, 2.44.1, 2.43.4, 2.42.2, 2.41.1, 2.40.2, and 2.39.4, repositories with submodules can be crafted in a way that exploits a bug in Git whereby it can be fooled into writing files not into the submodule's worktree but into a `.git/` directory. This allows writing a hook that will be executed while the clone operation is still running, giving the user no opportunity to inspect the code that is being executed. The problem has been patched in versions 2.45.1, 2.44.1, 2.43.4, 2.42.2, 2.41.1, 2.40.2, and 2.39.4. If symbolic link support is disabled in Git (e.g. via `git config --global core.symlinks false`), the described attack won't work. As always, it is best to avoid cloning repositories from untrusted sources.

1
2026-01-01 14:31
Unassigned
Vulnerability Policy
VULNERABILITY
Affected Hosts & Users
No hosts affected
No users affected
MITRE ATT&CK Mapping
No MITRE ATT&CK data available for this incident
File Artifacts 0
No file artifacts found for this incident
Network Artifacts 0
No network artifacts found for this incident
Process Artifacts 0
No process artifacts found for this incident
Registry Artifacts 0
No registry artifacts found for this incident
Analyst Verdict
CRITICAL
  • Isolate affected endpoints
  • Investigate all related alerts
  • Document findings
Summary
1
Alerts
0
Hosts
0
Files
0
Network
Alert Categories
VULNERABILITY
Timeline
01-15 14:03:43
CVE-2024-32002 vulnerability in Microsoft Visual Studio 2019 Community at DESKTOP-FNUMV3U
critical - Detected (Scanned)
01-01 14:31:29
Incident Modified
Status or details updated
01-01 14:31:29
Incident Resolved
resolved security testing
12-31 14:01:02
Incident Created
#10 - CVE-2024-32002 vulnerability in Microsoft Visual Studio 2019 Community at DESKTOP-FNUMV3U