Malicious users exploiting this vulnerability may be able to read and/or write information to shared directories.
This may also include IPC services and lead to remote code execution.
Severity: high
Fingerprint: 22420ce026fa767de22ea8c3df372350d400139279381f9279381f9279381f92
Found open SMB shares with NT AUTHORITY/ANONYMOUS LOGON print$ IPC$ Samsung_ML_191x_252x_Series_lars_von_trier
Severity: high
Fingerprint: 22420ce026fa767de22ea8c3df372350d400139279381f9206aea91c06aea91c
Found open SMB shares with NT AUTHORITY/ANONYMOUS LOGON print$ IPC$ Samsung_ML_191x_252x_Series_lars_von_trier HP_Color_LaserJet_M553_B5EBAB
Open service 132.247.181.43:445
2024-12-22 01:00
SMB NTLMSSP handshake results: Found non-Windows 6.1 build 0
Open service 132.247.181.43:445
2024-12-20 00:29
SMB NTLMSSP handshake results: Found non-Windows 6.1 build 0
Open service 132.247.181.43:445
2024-12-18 01:45
SMB NTLMSSP handshake results: Found non-Windows 6.1 build 0
Open service 132.247.181.43:445
2024-12-15 23:50
SMB NTLMSSP handshake results: Found non-Windows 6.1 build 0
Open service 132.247.181.43:445
2024-12-14 00:04
SMB NTLMSSP handshake results: Found non-Windows 6.1 build 0
Open service 132.247.181.43:445
2024-12-12 00:59
SMB NTLMSSP handshake results: Found non-Windows 6.1 build 0
Open service 132.247.181.43:445
2024-12-02 01:38
SMB NTLMSSP handshake results: Found non-Windows 6.1 build 0
Open service 132.247.181.43:445
2024-11-30 00:59
SMB NTLMSSP handshake results: Found non-Windows 6.1 build 0
Open service 132.247.181.43:445
2024-11-28 01:05
SMB NTLMSSP handshake results: Found non-Windows 6.1 build 0
Open service 132.247.181.43:445
2024-11-20 08:12
SMB NTLMSSP handshake results: Found non-Windows 6.1 build 0