Malicious users exploiting this vulnerability may be able to read and/or write information to shared directories.
This may also include IPC services and lead to remote code execution.
Severity: high
Fingerprint: 22420ce026fa767de22ea8c3a1d28561c5ae88105c337e4e013ddeb66646fe54
Found open SMB shares with NT AUTHORITY/ANONYMOUS LOGON ilhan Lilian Marie PalmaCloud Séverine IPC$
Severity: high
Fingerprint: 22420ce026fa767de22ea8c3a1d28561c5ae88103b984838a22c4ed095fc7712
Found open SMB shares with NT AUTHORITY/ANONYMOUS LOGON ilhan Lilian PalmaCloud Séverine IPC$
Open service 176.131.116.198:445
2026-01-08 12:14
SMB NTLMSSP handshake results: Found non-Windows 6.1 build 0
Open service 176.131.116.198:445
2026-01-01 13:21
SMB NTLMSSP handshake results: Found non-Windows 6.1 build 0
Open service 176.131.116.198:445
2025-12-29 21:14
SMB NTLMSSP handshake results: Found non-Windows 6.1 build 0
Open service 176.131.116.198:445
2025-12-22 03:37
SMB NTLMSSP handshake results: Found non-Windows 6.1 build 0
Open service 176.131.116.198:445
2025-12-20 04:15
SMB NTLMSSP handshake results: Found non-Windows 6.1 build 0