Malicious users exploiting this vulnerability may be able to read and/or write information to shared directories.
This may also include IPC services and lead to remote code execution.
Severity: high
Fingerprint: 22420ce026fa767de22ea8c3df372350f035fdf4c4eb7e2ec4eb7e2ec4eb7e2e
Found open SMB shares with NT AUTHORITY/ANONYMOUS LOGON print$ sharing IPC$
Open service 178.63.175.143:445
2024-12-22 00:47
SMB NTLMSSP handshake results: Found non-Windows 6.1 build 0
Open service 178.63.175.143:445
2024-12-20 00:57
SMB NTLMSSP handshake results: Found non-Windows 6.1 build 0
Open service 178.63.175.143:445
2024-12-18 01:38
SMB NTLMSSP handshake results: Found non-Windows 6.1 build 0
Open service 178.63.175.143:445
2024-12-15 23:59
SMB NTLMSSP handshake results: Found non-Windows 6.1 build 0
Open service 178.63.175.143:445
2024-12-13 23:43
SMB NTLMSSP handshake results: Found non-Windows 6.1 build 0
Open service 178.63.175.143:445
2024-12-12 00:34
SMB NTLMSSP handshake results: Found non-Windows 6.1 build 0
Open service 178.63.175.143:445
2024-12-02 00:36
SMB NTLMSSP handshake results: Found non-Windows 6.1 build 0
Open service 178.63.175.143:445
2024-11-29 22:30
SMB NTLMSSP handshake results: Found non-Windows 6.1 build 0
Open service 178.63.175.143:445
2024-11-27 23:01
SMB NTLMSSP handshake results: Found non-Windows 6.1 build 0