WARNING: This plugin will generate false positive and is purely informative:
regreSSHion: RCE in OpenSSH's server, on glibc-based Linux systems (CVE-2024-6387)
Severity: info
Fingerprint: 3f43e0ebb5dce37ab8b59eb563aa8aab07e8cfa607e8cfa607e8cfa607e8cfa6
Found potentially vulnerable SSH version: SSH-2.0-OpenSSH_9.2p1 Debian-2+deb12u5 WARNING, RISK IS ESTIMATED FALSE POSITIVE ARE LIKELY
Malicious users exploiting this vulnerability may be able to read and/or write information to shared directories.
This may also include IPC services and lead to remote code execution.
Severity: high
Fingerprint: 22420ce026fa767de22ea8c37198f65bd9856925d9856925d9856925d9856925
Found open SMB shares with NT AUTHORITY/ANONYMOUS LOGON ROOT IPC$
Open service 5.135.211.97:22
2026-01-08 16:46
Open service 5.135.211.97:445
2026-01-08 14:20
SMB NTLMSSP handshake results: Found non-Windows 6.1 build 0
Open service 5.135.211.97:445
2026-01-01 18:19
SMB NTLMSSP handshake results: Found non-Windows 6.1 build 0
Open service 5.135.211.97:22
2026-01-01 16:49
Open service 5.135.211.97:445
2025-12-30 01:48
SMB NTLMSSP handshake results: Found non-Windows 6.1 build 0
Open service 5.135.211.97:22
2025-12-29 22:04
Open service 5.135.211.97:22
2025-12-23 21:40
Open service 5.135.211.97:445
2025-12-23 21:18
SMB NTLMSSP handshake results: Found non-Windows 6.1 build 0
Open service 5.135.211.97:22
2025-12-21 21:18
Open service 5.135.211.97:445
2025-12-21 21:18
SMB NTLMSSP handshake results: Found non-Windows 6.1 build 0
Open service 5.135.211.97:22
2025-12-20 03:46
Open service 5.135.211.97:445
2025-12-19 21:53
SMB NTLMSSP handshake results: Found non-Windows 6.1 build 0