CrowdStrike has identified an active exploitation of a Git vulnerability, CVE-2025-48384, which affects macOS and Linux systems due to issues with Git's handling of carriage return characters in configuration files. This vulnerability allows threat actors to exploit Git repositories by inserting malicious content into a submodule path, leading to arbitrary code execution when the repository is cloned with the `git clone --recursive` command. The attack emphasizes the importance of timely patching and a comprehensive security strategy. CrowdStrike's Falcon platform offers machine learning and behavior-based detection capabilities to automatically detect and prevent such exploits. Additionally, the platform provides a Next-Gen SIEM rule template for alerting on suspicious Git activity, and its Charlotte AI assists analysts by offering investigative steps and insights to mitigate threats.