Malicious users exploiting this vulnerability may be able to read and/or write information to shared directories.
This may also include IPC services and lead to remote code execution.
Severity: high
Fingerprint: 22420ce026fa767de22ea8c372608294ece64c99e3690f568a8532633bac513c
Found open SMB shares with NT AUTHORITY/ANONYMOUS LOGON 3D Design Ambience Admin Ambience Admin Bank Ambience Andrea Ambience Lorena Andrea Cloud Sync Data homes HR Marketing SCAN IPC$
Severity: high
Fingerprint: 22420ce026fa767de22ea8c372608294ece64c99e3690f568a853263832a2b36
Found open SMB shares with NT AUTHORITY/ANONYMOUS LOGON 3D Design Ambience Admin Ambience Admin Bank Ambience Andrea Ambience Lorena Andrea Cloud Sync Data homes Marketing SCAN IPC$
Open service 193.5.150.11:445
2024-12-22 00:59
SMB NTLMSSP handshake results: Found non-Windows 6.1 build 0
Open service 193.5.150.11:445
2024-12-20 00:34
SMB NTLMSSP handshake results: Found non-Windows 6.1 build 0
Open service 193.5.150.11:445
2024-12-18 01:47
SMB NTLMSSP handshake results: Found non-Windows 6.1 build 0
Open service 193.5.150.11:445
2024-12-15 23:50
SMB NTLMSSP handshake results: Found non-Windows 6.1 build 0
Open service 193.5.150.11:445
2024-12-14 00:07
SMB NTLMSSP handshake results: Found non-Windows 6.1 build 0
Open service 193.5.150.11:445
2024-12-12 01:04
SMB NTLMSSP handshake results: Found non-Windows 6.1 build 0
Open service 193.5.150.11:445
2024-12-02 01:32
SMB NTLMSSP handshake results: Found non-Windows 6.1 build 0
Open service 193.5.150.11:445
2024-11-30 00:50
SMB NTLMSSP handshake results: Found non-Windows 6.1 build 0
Open service 193.5.150.11:445
2024-11-28 00:57
SMB NTLMSSP handshake results: Found non-Windows 6.1 build 0