Malicious users exploiting this vulnerability may be able to read and/or write information to shared directories.
This may also include IPC services and lead to remote code execution.
Severity: high
Fingerprint: 22420ce026fa767de22ea8c31731519cac11e27f37663556434f923c76ac7d4a
Found open SMB shares with NT AUTHORITY/ANONYMOUS LOGON Public robson Backup_UNM brother5652 opasuite ixc contas_pagas Recycle Bin - Volume_1 IPC$
Severity: high
Fingerprint: 22420ce026fa767de22ea8c31731519cac11e27fed57e33e8405f8e3ba0bd2e0
Found open SMB shares with NT AUTHORITY/ANONYMOUS LOGON Public robson Backup-mksolutions Backup_UNM brother5652 mkradius opasuite ixc Recycle Bin - Volume_1 IPC$
Open service 168.0.152.11:445
2024-12-22 01:00
SMB NTLMSSP handshake results: Found non-Windows 6.1 build 0
Open service 168.0.152.11:445
2024-12-20 00:29
SMB NTLMSSP handshake results: Found non-Windows 6.1 build 0
Open service 168.0.152.11:445
2024-12-18 01:44
SMB NTLMSSP handshake results: Found non-Windows 6.1 build 0
Open service 168.0.152.11:8001
2024-12-17 21:37
HTTP/1.1 404 Not Found Content-Type: application/json Vary: Origin Date: Tue, 17 Dec 2024 21:37:29 GMT Content-Length: 40 Connection: close {"key":"notFound","message":"Not Found"}
Open service 168.0.152.11:445
2024-12-15 23:50
SMB NTLMSSP handshake results: Found non-Windows 6.1 build 0
Open service 168.0.152.11:445
2024-12-14 00:01
SMB NTLMSSP handshake results: Found non-Windows 6.1 build 0
Open service 168.0.152.11:445
2024-12-12 01:01
SMB NTLMSSP handshake results: Found non-Windows 6.1 build 0
Open service 168.0.152.11:445
2024-12-02 01:27
SMB NTLMSSP handshake results: Found non-Windows 6.1 build 0
Open service 168.0.152.11:445
2024-11-30 01:03
SMB NTLMSSP handshake results: Found non-Windows 6.1 build 0
Open service 168.0.152.11:445
2024-11-28 01:06
SMB NTLMSSP handshake results: Found non-Windows 6.1 build 0
Open service 168.0.152.11:445
2024-11-20 16:26
SMB NTLMSSP handshake results: Found non-Windows 6.1 build 0