Malicious users exploiting this vulnerability may be able to read and/or write information to shared directories.
This may also include IPC services and lead to remote code execution.
Severity: high
Fingerprint: 22420ce026fa767d3962741c23bfd32f75afa13ed1f5c2bc41e18db058368142
Found open SMB shares with Guest login ADMIN$ C$ c_data D D$ IPC$ Users
Severity: high
Fingerprint: 22420ce026fa767d3962741c23bfd32f75afa13e817ad4de068ebcbe3be74334
Found open SMB shares with Guest login ADMIN$ C$ D D$ IPC$ Users
Severity: high
Fingerprint: 22420ce026fa767d3962741c23bfd32f75afa13ed1f5c2bc41e18db028524d72
Found open SMB shares with Guest login ADMIN$ C$ c_data D D$ IPC$ PIC Users
Open service 114.35.68.66:445
2024-09-15 23:04
SMB NTLMSSP handshake results: Found Windows 10.0 build 20348 NbComputerName: SERVER-2022 NbDomainName: SERVER-2022 DNSComputerName: SERVER-2022 DNSDomainName: SERVER-2022
Open service 114.35.68.66:445
2024-09-13 23:10
SMB NTLMSSP handshake results: Found Windows 10.0 build 20348 NbComputerName: SERVER-2022 NbDomainName: SERVER-2022 DNSComputerName: SERVER-2022 DNSDomainName: SERVER-2022
Open service 114.35.68.66:445
2024-09-11 22:35
SMB NTLMSSP handshake results: Found Windows 10.0 build 20348 NbComputerName: SERVER-2022 NbDomainName: SERVER-2022 DNSComputerName: SERVER-2022 DNSDomainName: SERVER-2022
Open service 114.35.68.66:445
2024-09-11 02:54
SMB NTLMSSP handshake results: Found Windows 10.0 build 20348 NbComputerName: SERVER-2022 NbDomainName: SERVER-2022 DNSComputerName: SERVER-2022 DNSDomainName: SERVER-2022
Open service 114.35.68.66:443
2024-09-10 05:22
HTTP/1.1 200 OK Connection: close ETag: "3c9-110-64bf7525" Last-Modified: Tue, 25 Jul 2023 07:09:25 GMT Date: Tue, 10 Sep 2024 05:22:12 GMT X-Frame-Options: deny Content-Security-Policy: frame-ancestors 'none' Cache-Control: no-cache Expires: 0 Content-Type: text/html Content-Length: 272 <?xml version="1.0" encoding="utf-8"?> <!DOCTYPE html PUBLIC "-//W3C//DTD XHTML 1.1//EN" "http://www.w3.org/TR/xhtml11/DTD/xhtml11.dtd"> <html xmlns="http://www.w3.org/1999/xhtml"> <head> <meta http-equiv="refresh" content="0; URL=/webpages/index.html" /> </head> </html>
Open service 114.35.68.66:445
2024-09-09 22:04
SMB NTLMSSP handshake results: Found Windows 10.0 build 20348 NbComputerName: SERVER-2022 NbDomainName: SERVER-2022 DNSComputerName: SERVER-2022 DNSDomainName: SERVER-2022
Open service 114.35.68.66:445
2024-09-07 22:02
SMB NTLMSSP handshake results: Found Windows 10.0 build 20348 NbComputerName: SERVER-2022 NbDomainName: SERVER-2022 DNSComputerName: SERVER-2022 DNSDomainName: SERVER-2022
Open service 114.35.68.66:445
2024-08-17 22:45
SMB NTLMSSP handshake results: Found Windows 10.0 build 20348 NbComputerName: SERVER-2022 NbDomainName: SERVER-2022 DNSComputerName: SERVER-2022 DNSDomainName: SERVER-2022
Open service 114.35.68.66:445
2024-08-15 23:15
SMB NTLMSSP handshake results: Found Windows 10.0 build 20348 NbComputerName: SERVER-2022 NbDomainName: SERVER-2022 DNSComputerName: SERVER-2022 DNSDomainName: SERVER-2022
Open service 114.35.68.66:445
2024-08-13 22:53
SMB NTLMSSP handshake results: Found Windows 10.0 build 20348 NbComputerName: SERVER-2022 NbDomainName: SERVER-2022 DNSComputerName: SERVER-2022 DNSDomainName: SERVER-2022
Open service 114.35.68.66:445
2024-08-11 22:54
SMB NTLMSSP handshake results: Found Windows 10.0 build 20348 NbComputerName: SERVER-2022 NbDomainName: SERVER-2022 DNSComputerName: SERVER-2022 DNSDomainName: SERVER-2022
Open service 114.35.68.66:445
2024-08-09 22:56
SMB NTLMSSP handshake results: Found Windows 10.0 build 20348 NbComputerName: SERVER-2022 NbDomainName: SERVER-2022 DNSComputerName: SERVER-2022 DNSDomainName: SERVER-2022
Open service 114.35.68.66:445
2024-08-07 20:53
SMB NTLMSSP handshake results: Found Windows 10.0 build 20348 NbComputerName: SERVER-2022 NbDomainName: SERVER-2022 DNSComputerName: SERVER-2022 DNSDomainName: SERVER-2022