Malicious users exploiting this vulnerability may be able to read and/or write information to shared directories.
This may also include IPC services and lead to remote code execution.
Severity: high
Fingerprint: 22420ce026fa767de22ea8c31785ea4e957091bc957091bc957091bc957091bc
Found open SMB shares with NT AUTHORITY/ANONYMOUS LOGON Sauvegarde IPC$
Severity: high
Fingerprint: 22420ce026fa767de22ea8c36c4e85abf74bc7ec2cfb6f14e80f4a5da1778d53
Found open SMB shares with NT AUTHORITY/ANONYMOUS LOGON FTP Sauvegarde_PolylogicNas1 Sauvegardes Video IPC$
Open service 90.7.208.10:445
2024-12-22 00:44
SMB NTLMSSP handshake results: Found non-Windows 6.1 build 0
Open service 90.7.208.10:445
2024-12-20 00:57
SMB NTLMSSP handshake results: Found non-Windows 6.1 build 0
Open service 90.7.208.10:445
2024-12-18 01:36
SMB NTLMSSP handshake results: Found non-Windows 6.1 build 0
Open service 90.7.208.10:445
2024-12-15 23:51
SMB NTLMSSP handshake results: Found non-Windows 6.1 build 0
Open service 90.7.208.10:445
2024-12-13 23:25
SMB NTLMSSP handshake results: Found non-Windows 6.1 build 0
Open service 90.7.208.10:445
2024-12-11 22:16
SMB NTLMSSP handshake results: Found non-Windows 6.1 build 0
Open service 90.7.208.10:445
2024-12-02 01:07
SMB NTLMSSP handshake results: Found non-Windows 6.1 build 0
Open service 90.7.208.10:445
2024-11-30 00:27
SMB NTLMSSP handshake results: Found non-Windows 6.1 build 0
Open service 90.7.208.10:445
2024-11-28 00:50
SMB NTLMSSP handshake results: Found non-Windows 6.1 build 0
Open service 90.7.208.10:445
2024-11-20 11:25
SMB NTLMSSP handshake results: Found non-Windows 6.1 build 0