Malicious users exploiting this vulnerability may be able to read and/or write information to shared directories.
This may also include IPC services and lead to remote code execution.
Severity: high
Fingerprint: 22420ce026fa767de22ea8c3df372350682cad1e29de6dac29de6dac29de6dac
Found open SMB shares with NT AUTHORITY/ANONYMOUS LOGON print$ images IPC$
Open service 45.154.177.5:445
2024-12-22 01:00
SMB NTLMSSP handshake results: Found non-Windows 6.1 build 0
Open service 45.154.177.5:445
2024-12-20 00:36
SMB NTLMSSP handshake results: Found non-Windows 6.1 build 0
Open service 45.154.177.5:445
2024-12-18 01:50
SMB NTLMSSP handshake results: Found non-Windows 6.1 build 0
Open service 45.154.177.5:445
2024-12-17 20:44
SMB NTLMSSP handshake results: Found non-Windows 6.1 build 0
Open service 45.154.177.5:445
2024-12-15 22:55
SMB NTLMSSP handshake results: Found non-Windows 6.1 build 0
Open service 45.154.177.5:445
2024-12-13 23:54
SMB NTLMSSP handshake results: Found non-Windows 6.1 build 0
Open service 45.154.177.5:445
2024-12-12 00:37
SMB NTLMSSP handshake results: Found non-Windows 6.1 build 0
Open service 45.154.177.5:445
2024-12-01 23:53
SMB NTLMSSP handshake results: Found non-Windows 6.1 build 0
Open service 45.154.177.5:445
2024-11-29 21:42
SMB NTLMSSP handshake results: Found non-Windows 6.1 build 0
Open service 45.154.177.5:445
2024-11-27 23:27
SMB NTLMSSP handshake results: Found non-Windows 6.1 build 0