Malicious users exploiting this vulnerability may be able to read and/or write information to shared directories.
This may also include IPC services and lead to remote code execution.
Severity: high
Fingerprint: 22420ce026fa767de22ea8c3df372350366c3372ad47be65a2f8036ba2f8036b
Found open SMB shares with NT AUTHORITY/ANONYMOUS LOGON print$ loxasoluciones Public IPC$
Open service 45.164.66.194:445
2024-12-22 00:48
SMB NTLMSSP handshake results: Found non-Windows 6.1 build 0
Open service 45.164.66.194:445
2024-12-20 00:57
SMB NTLMSSP handshake results: Found non-Windows 6.1 build 0
Open service 45.164.66.194:445
2024-12-18 01:38
SMB NTLMSSP handshake results: Found non-Windows 6.1 build 0
Open service 45.164.66.194:80
2024-12-17 21:26
HTTP/1.1 200 OK Cache-control:no-cache, no-store, max-age=0 Content-Type:text/html Pragma:no-cache Transfer-Encoding:chunked X-Frame-Options:SAMEORIGIN Connection:Keep-Alive
Open service 45.164.66.194:445
2024-12-15 23:59
SMB NTLMSSP handshake results: Found non-Windows 6.1 build 0
Open service 45.164.66.194:445
2024-12-13 23:43
SMB NTLMSSP handshake results: Found non-Windows 6.1 build 0
Open service 45.164.66.194:445
2024-12-12 00:39
SMB NTLMSSP handshake results: Found non-Windows 6.1 build 0
Open service 45.164.66.194:445
2024-12-02 00:09
SMB NTLMSSP handshake results: Found non-Windows 6.1 build 0
Open service 45.164.66.194:445
2024-11-29 22:57
SMB NTLMSSP handshake results: Found non-Windows 6.1 build 0
Open service 45.164.66.194:445
2024-11-27 22:25
SMB NTLMSSP handshake results: Found non-Windows 6.1 build 0