Malicious users exploiting this vulnerability may be able to read and/or write information to shared directories.
This may also include IPC services and lead to remote code execution.
Severity: high
Fingerprint: 22420ce026fa767de22ea8c3df372350a489a939155f21e7155f21e7155f21e7
Found open SMB shares with NT AUTHORITY/ANONYMOUS LOGON print$ publish IPC$
Open service 159.65.154.22:445
2024-12-22 01:00
SMB NTLMSSP handshake results: Found non-Windows 6.1 build 0
Open service 159.65.154.22:445
2024-12-20 00:31
SMB NTLMSSP handshake results: Found non-Windows 6.1 build 0
Open service 159.65.154.22:445
2024-12-18 01:40
SMB NTLMSSP handshake results: Found non-Windows 6.1 build 0
Open service 159.65.154.22:445
2024-12-15 23:20
SMB NTLMSSP handshake results: Found non-Windows 6.1 build 0
Open service 159.65.154.22:445
2024-12-13 22:58
SMB NTLMSSP handshake results: Found non-Windows 6.1 build 0
Open service 159.65.154.22:445
2024-12-11 23:22
SMB NTLMSSP handshake results: Found non-Windows 6.1 build 0
Open service 159.65.154.22:445
2024-12-01 23:20
SMB NTLMSSP handshake results: Found non-Windows 6.1 build 0
Open service 159.65.154.22:445
2024-11-29 23:27
SMB NTLMSSP handshake results: Found non-Windows 6.1 build 0
Open service 159.65.154.22:445
2024-11-27 23:58
SMB NTLMSSP handshake results: Found non-Windows 6.1 build 0