Malicious users exploiting this vulnerability may be able to read and/or write information to shared directories.
This may also include IPC services and lead to remote code execution.
Severity: high
Fingerprint: 22420ce026fa767de22ea8c365d2a51d44393518443935184439351844393518
Found open SMB shares with NT AUTHORITY/ANONYMOUS LOGON IPC$ nobody
Severity: high
Fingerprint: 22420ce026fa767de22ea8c365d2a51d65d2a51d65d2a51d65d2a51d65d2a51d
Found open SMB shares with NT AUTHORITY/ANONYMOUS LOGON IPC$
Open service 212.224.70.34:445
2024-12-22 01:00
SMB NTLMSSP handshake results: Found non-Windows 6.1 build 0
Open service 212.224.70.34:445
2024-12-20 00:29
SMB NTLMSSP handshake results: Found non-Windows 6.1 build 0
Open service 212.224.70.34:445
2024-12-18 01:44
SMB NTLMSSP handshake results: Found non-Windows 6.1 build 0
Open service 212.224.70.34:445
2024-12-15 23:44
SMB NTLMSSP handshake results: Found non-Windows 6.1 build 0
Open service 212.224.70.34:445
2024-12-14 00:02
SMB NTLMSSP handshake results: Found non-Windows 6.1 build 0
Open service 212.224.70.34:445
2024-12-12 00:58
SMB NTLMSSP handshake results: Found non-Windows 6.1 build 0
Open service 212.224.70.34:445
2024-12-02 01:15
SMB NTLMSSP handshake results: Found non-Windows 6.1 build 0
Open service 212.224.70.34:445
2024-11-30 00:41
SMB NTLMSSP handshake results: Found non-Windows 6.1 build 0
Open service 212.224.70.34:445
2024-11-28 01:01
SMB NTLMSSP handshake results: Found non-Windows 6.1 build 0
Open service 212.224.70.34:445
2024-11-20 17:20
SMB NTLMSSP handshake results: Found non-Windows 6.1 build 0