Malicious users exploiting this vulnerability may be able to read and/or write information to shared directories.
This may also include IPC services and lead to remote code execution.
Severity: high
Fingerprint: 22420ce026fa767de22ea8c30e9c2bbb3c215fc53c215fc53c215fc53c215fc5
Found open SMB shares with NT AUTHORITY/ANONYMOUS LOGON Daten IPC$
Open service 91.224.66.51:445
2024-12-22 00:48
SMB NTLMSSP handshake results: Found non-Windows 6.1 build 0
Open service 91.224.66.51:445
2024-12-20 00:57
SMB NTLMSSP handshake results: Found non-Windows 6.1 build 0
Open service 91.224.66.51:445
2024-12-18 01:41
SMB NTLMSSP handshake results: Found non-Windows 6.1 build 0
Open service 91.224.66.51:445
2024-12-17 20:09
SMB NTLMSSP handshake results: Found non-Windows 6.1 build 0
Open service 91.224.66.51:445
2024-12-15 23:19
SMB NTLMSSP handshake results: Found non-Windows 6.1 build 0
Open service 91.224.66.51:445
2024-12-13 22:24
SMB NTLMSSP handshake results: Found non-Windows 6.1 build 0
Open service 91.224.66.51:445
2024-12-11 23:56
SMB NTLMSSP handshake results: Found non-Windows 6.1 build 0
Open service 91.224.66.51:445
2024-12-02 00:22
SMB NTLMSSP handshake results: Found non-Windows 6.1 build 0
Open service 91.224.66.51:445
2024-11-29 22:45
SMB NTLMSSP handshake results: Found non-Windows 6.1 build 0
Open service 91.224.66.51:445
2024-11-27 22:38
SMB NTLMSSP handshake results: Found non-Windows 6.1 build 0