Skip to main content
Press slash or control plus K to focus the search. Use the arrow keys to navigate results and press enter to open a threat.
Reconnecting to live updates…

CVE-2000-0325: The Microsoft Jet database engine allows an attacker to execute commands via a database query, aka t

0
High
VulnerabilityCVE-2000-0325cve-2000-0325
Published: Fri Aug 20 1999 (08/20/1999, 04:00:00 UTC)
Source: NVD
Vendor/Project: microsoft
Product: jet

Description

The Microsoft Jet database engine allows an attacker to execute commands via a database query, aka the "VBA Shell" vulnerability.

AI-Powered Analysis

AILast updated: 06/27/2025, 17:55:02 UTC

Technical Analysis

CVE-2000-0325 is a high-severity vulnerability in the Microsoft Jet database engine versions 3.5 and 3.5.1, disclosed in 1999. The vulnerability, also known as the "VBA Shell" vulnerability, allows an attacker to execute arbitrary commands on a target system via specially crafted database queries. Specifically, the flaw arises because the Jet engine improperly handles certain database queries that invoke Visual Basic for Applications (VBA) Shell commands, enabling command injection. This can lead to full compromise of the affected system, impacting confidentiality, integrity, and availability. The vulnerability requires local access (AV:L) but no authentication (Au:N), and has low attack complexity (AC:L). Although no known exploits have been reported in the wild, the potential impact is significant due to the ability to execute arbitrary code. Microsoft issued patches in security bulletin MS99-030 to address this issue. The Jet engine is commonly used in Microsoft Access and other database applications, often embedded in business-critical applications for data management and automation. Given the age of the vulnerability, modern systems are unlikely to be affected unless legacy software or databases still rely on these older Jet engine versions.

Potential Impact

For European organizations, the impact of CVE-2000-0325 depends largely on the continued use of legacy systems utilizing Microsoft Jet 3.5 or 3.5.1. Organizations in sectors such as government, manufacturing, finance, and healthcare may still have legacy databases or applications relying on these versions. Exploitation could allow attackers to execute arbitrary commands, potentially leading to data theft, unauthorized data manipulation, or disruption of services. This could result in regulatory non-compliance, especially under GDPR, due to data breaches or loss of data integrity. Additionally, critical infrastructure or industrial control systems using legacy databases could face operational disruptions. Although the vulnerability requires local access, insider threats or attackers who gain initial footholds could leverage this to escalate privileges or move laterally within networks. The absence of known exploits reduces immediate risk, but unpatched legacy systems remain vulnerable to targeted attacks.

Mitigation Recommendations

European organizations should first conduct thorough asset inventories to identify any systems running Microsoft Jet engine versions 3.5 or 3.5.1. For identified systems, immediate application of the official Microsoft patch from MS99-030 is essential. If patching is not feasible due to legacy dependencies, organizations should isolate affected systems from critical networks and restrict local access to trusted personnel only. Employing application whitelisting and endpoint detection can help monitor and prevent unauthorized command execution. Additionally, migrating legacy databases and applications to supported, modern platforms should be prioritized to eliminate exposure. Regular security audits and user training to recognize suspicious activities related to database access can further reduce risk. Network segmentation and strict access controls will limit the potential for lateral movement if exploitation occurs.

Need more detailed analysis?Upgrade to Pro Console

Threat ID: 682ca32cb6fd31d6ed7df1b0

Added to database: 5/20/2025, 3:43:40 PM

Last enriched: 6/27/2025, 5:55:02 PM

Last updated: 2/7/2026, 7:14:17 AM

Views: 38

Community Reviews

0 reviews

Crowdsource mitigation strategies, share intel context, and vote on the most helpful responses. Sign in to add your voice and help keep defenders ahead.

Sort by
Loading community insights…

Want to contribute mitigation steps or threat intel context? Sign in or create an account to join the community discussion.

Actions

PRO

Updates to AI analysis require Pro Console access. Upgrade inside Console → Billing.

Please log in to the Console to use AI analysis features.

Need more coverage?

Upgrade to Pro Console in Console -> Billing for AI refresh and higher limits.

For incident response and remediation, OffSeq services can help resolve threats faster.

Latest Threats