Skip to main content

CVE-2000-0325: The Microsoft Jet database engine allows an attacker to execute commands via a database query, aka t

High
VulnerabilityCVE-2000-0325cve-2000-0325
Published: Fri Aug 20 1999 (08/20/1999, 04:00:00 UTC)
Source: NVD
Vendor/Project: microsoft
Product: jet

Description

The Microsoft Jet database engine allows an attacker to execute commands via a database query, aka the "VBA Shell" vulnerability.

AI-Powered Analysis

AILast updated: 06/27/2025, 17:55:02 UTC

Technical Analysis

CVE-2000-0325 is a high-severity vulnerability in the Microsoft Jet database engine versions 3.5 and 3.5.1, disclosed in 1999. The vulnerability, also known as the "VBA Shell" vulnerability, allows an attacker to execute arbitrary commands on a target system via specially crafted database queries. Specifically, the flaw arises because the Jet engine improperly handles certain database queries that invoke Visual Basic for Applications (VBA) Shell commands, enabling command injection. This can lead to full compromise of the affected system, impacting confidentiality, integrity, and availability. The vulnerability requires local access (AV:L) but no authentication (Au:N), and has low attack complexity (AC:L). Although no known exploits have been reported in the wild, the potential impact is significant due to the ability to execute arbitrary code. Microsoft issued patches in security bulletin MS99-030 to address this issue. The Jet engine is commonly used in Microsoft Access and other database applications, often embedded in business-critical applications for data management and automation. Given the age of the vulnerability, modern systems are unlikely to be affected unless legacy software or databases still rely on these older Jet engine versions.

Potential Impact

For European organizations, the impact of CVE-2000-0325 depends largely on the continued use of legacy systems utilizing Microsoft Jet 3.5 or 3.5.1. Organizations in sectors such as government, manufacturing, finance, and healthcare may still have legacy databases or applications relying on these versions. Exploitation could allow attackers to execute arbitrary commands, potentially leading to data theft, unauthorized data manipulation, or disruption of services. This could result in regulatory non-compliance, especially under GDPR, due to data breaches or loss of data integrity. Additionally, critical infrastructure or industrial control systems using legacy databases could face operational disruptions. Although the vulnerability requires local access, insider threats or attackers who gain initial footholds could leverage this to escalate privileges or move laterally within networks. The absence of known exploits reduces immediate risk, but unpatched legacy systems remain vulnerable to targeted attacks.

Mitigation Recommendations

European organizations should first conduct thorough asset inventories to identify any systems running Microsoft Jet engine versions 3.5 or 3.5.1. For identified systems, immediate application of the official Microsoft patch from MS99-030 is essential. If patching is not feasible due to legacy dependencies, organizations should isolate affected systems from critical networks and restrict local access to trusted personnel only. Employing application whitelisting and endpoint detection can help monitor and prevent unauthorized command execution. Additionally, migrating legacy databases and applications to supported, modern platforms should be prioritized to eliminate exposure. Regular security audits and user training to recognize suspicious activities related to database access can further reduce risk. Network segmentation and strict access controls will limit the potential for lateral movement if exploitation occurs.

Need more detailed analysis?Get Pro

Threat ID: 682ca32cb6fd31d6ed7df1b0

Added to database: 5/20/2025, 3:43:40 PM

Last enriched: 6/27/2025, 5:55:02 PM

Last updated: 7/26/2025, 2:17:35 PM

Views: 11

Actions

PRO

Updates to AI analysis are available only with a Pro account. Contact root@offseq.com for access.

Please log in to the Console to use AI analysis features.

Need enhanced features?

Contact root@offseq.com for Pro access with improved analysis and higher rate limits.

Latest Threats