Malicious users exploiting this vulnerability may be able to read and/or write information to shared directories.
This may also include IPC services and lead to remote code execution.
Severity: high
Fingerprint: 22420ce026fa767de22ea8c3df372350d54214c16ad663bf6ad663bf6ad663bf
Found open SMB shares with NT AUTHORITY/ANONYMOUS LOGON print$ sambas IPC$
Severity: high
Fingerprint: 22420ce026fa767de22ea8c3df372350d4001392d4001392d4001392d4001392
Found open SMB shares with NT AUTHORITY/ANONYMOUS LOGON print$ IPC$
Open service 65.108.50.72:445
2024-12-22 01:00
SMB NTLMSSP handshake results: Found non-Windows 6.1 build 0
Open service 65.108.50.72:445
2024-12-20 00:35
SMB NTLMSSP handshake results: Found non-Windows 6.1 build 0
Open service 65.108.50.72:445
2024-12-18 01:48
SMB NTLMSSP handshake results: Found non-Windows 6.1 build 0
Open service 65.108.50.72:445
2024-12-15 23:54
SMB NTLMSSP handshake results: Found non-Windows 6.1 build 0
Open service 65.108.50.72:445
2024-12-14 00:06
SMB NTLMSSP handshake results: Found non-Windows 6.1 build 0
Open service 65.108.50.72:445
2024-12-12 01:02
SMB NTLMSSP handshake results: Found non-Windows 6.1 build 0
Open service 65.108.50.72:445
2024-12-02 01:02
SMB NTLMSSP handshake results: Found non-Windows 6.1 build 0
Open service 65.108.50.72:445
2024-11-29 23:46
SMB NTLMSSP handshake results: Found non-Windows 6.1 build 0
Open service 65.108.50.72:445
2024-11-27 23:38
SMB NTLMSSP handshake results: Found non-Windows 6.1 build 0