Malicious users exploiting this vulnerability may be able to read and/or write information to shared directories.
This may also include IPC services and lead to remote code execution.
Severity: high
Fingerprint: 22420ce026fa767de22ea8c3df372350d400139254a146a254a146a254a146a2
Found open SMB shares with NT AUTHORITY/ANONYMOUS LOGON print$ IPC$ Zebra
Open service 135.125.235.113:445
2024-11-02 01:39
SMB NTLMSSP handshake results: Found non-Windows 6.1 build 0
Open service 135.125.235.113:445
2024-11-01 00:01
SMB NTLMSSP handshake results: Found non-Windows 6.1 build 0
Open service 135.125.235.113:445
2024-10-30 00:41
SMB NTLMSSP handshake results: Found non-Windows 6.1 build 0
Open service 135.125.235.113:445
2024-10-21 23:47
SMB NTLMSSP handshake results: Found non-Windows 6.1 build 0
Open service 135.125.235.113:445
2024-10-19 23:54
SMB NTLMSSP handshake results: Found non-Windows 6.1 build 0
Open service 135.125.235.113:445
2024-10-17 23:29
SMB NTLMSSP handshake results: Found non-Windows 6.1 build 0
Open service 135.125.235.113:445
2024-10-16 01:20
SMB NTLMSSP handshake results: Found non-Windows 6.1 build 0
Open service 135.125.235.113:445
2024-10-01 23:49
SMB NTLMSSP handshake results: Found non-Windows 6.1 build 0
Open service 135.125.235.113:445
2024-09-29 23:49
SMB NTLMSSP handshake results: Found non-Windows 6.1 build 0
Open service 135.125.235.113:445
2024-09-27 23:48
SMB NTLMSSP handshake results: Found non-Windows 6.1 build 0