You might be surprised how common this situation is.
The short answer is, yes, there are all kinds of things that you can do. But it will require that you understand the normal operating state of the server and to start locking down those states.
As with a full company cybersecurity programme, you can break it down into steps/phases:
- Identify everything that is running, all ports, all admin/service accounts, all expected outbound connections, all types of data, and the risks to each of those things if something goes horribly wrong
- Protect those things that you have identified in proportion to the risks that exist for those things: firewalls rules that whitelist only that which is needed, configure encryption, reset admin and service account passwords, disable unused accounts
- Detect any anomalous activity to determine if there is a persistent threat or if you missed something in your Identify phase by setting up logging and monitoring processes
- Respond quickly and with pre-approval to things that will result in unacceptable risk to the company
I would also look at the patches that were not applied and see if things can be patched or if you can deploy alternate mitigations for the highest risk things.
In general, I would assume that the server has already been cracked and is used by malicious actors. I'd also assume that there are people who have inappropriate access to the server and its data. And while you might not be able to "fix" the situation, by making these assumptions, you can set expectations and set the level of effort and protection required.
psandlsofto see what is actually running? – schroeder Feb 20 '19 at 20:25