• About Us
  • Advertising
  • Digital Magazine
  • Supplements
  • Media Pack
  • Privacy Policy
  • Contact us
CXO Insight Middle East
  • News
  • Opinion
  • Business
    • Industries
      • Transport
      • Retail
      • Government
      • Real Estate
      • Education
      • Energy
      • Banking and Finance
    • Channel
  • Future
    • Tech
    • Gadgets
    • Science
    • Space
    • Sustainability
  • Events
    • Channel Insights Summit 2025
    • Insight Innovation Summit
    • CXO50 Oman
    • CXO50
    • ICT Awards
      • Dubai 2025
      • Saudi Arabia
    • Cyber Strategists Summit
    • Cloud Connect 2025
    • Channel Awards 2024
    • All events
  • GITEX
  • Digital Magazine
No Result
View All Result
CXO Insight Middle East
  • News
  • Opinion
  • Business
    • Industries
      • Transport
      • Retail
      • Government
      • Real Estate
      • Education
      • Energy
      • Banking and Finance
    • Channel
  • Future
    • Tech
    • Gadgets
    • Science
    • Space
    • Sustainability
  • Events
    • Channel Insights Summit 2025
    • Insight Innovation Summit
    • CXO50 Oman
    • CXO50
    • ICT Awards
      • Dubai 2025
      • Saudi Arabia
    • Cyber Strategists Summit
    • Cloud Connect 2025
    • Channel Awards 2024
    • All events
  • GITEX
  • Digital Magazine
No Result
View All Result
CXO Insight Middle East
No Result
View All Result

Defending Against Vulnerabilities In Microsoft Access Database

by CXO Staff
January 12, 2020
in Opinions

Matthew Gardiner from Mimecast, helps businesses navigate the security implications of a memory leak in the Microsoft Access Database.

cybersecurity security digital risk
Matthew Gardiner, Mimecast
Matthew Gardiner, Mimecast

In January 2019, Mimecast Research Labs discovered and disclosed CVE-2019-0560, a Microsoft Office product vulnerability. Recently the lab discovered and disclosed a startingly similar new vulnerability called MDB Leaker that required a patch (CVE-2019-1463) in Microsoft’s Access database application.

If this vulnerability is left unpatched, it could leave 85,000 companies – nearly 60% of which are in the US – exposed to a leak of sensitive data.

How are these two vulnerabilities similar? Because of how a common coding mistake – in this case the improper management of system memory by an application – can lead to the unintended disclosure of sensitive or private information.

False Positives Can be Good

While false negatives such as missing malicious files or emails should always be minimised, counterintuitively, not all false positives are inherently bad. For instance, with MDB Leaker, as with the January 2019 Microsoft Office vulnerability, the report of a potential false positive proved to be critical to this discovery. Here’s how.

After receiving a false positive report for a particular Microsoft Access file flagged through static file analysis, Mimecast researchers swung into action and determined that there were code fragments in what should clearly be a data-only file type, a Microsoft Access MDB file. From there, the team suspected improperly-managed system memory in the Microsoft Access application, and they were able to reverse-engineer Microsoft Access and quickly reproduce the problem and track it back through multiple older versions of Microsoft Access.

What is the Security Vulnerability?

MDB Leaker is nearly identical to the broader Office memory leak discovered early in 2019, which causes the content of uninitiated memory elements to be saved into every file – at least since Access 2002 – that is saved with an unpatched version of Access. While in many cases, due to the randomness of memory content at play here, the data unintentionally saved into the file will often be valueless content fragments. However, this will certainly not always be true.

In some cases, the unintended data saved into the MDB file could be sensitive information such as passwords, certificates, web requests, and domain/user information. There is no way of knowing without looking! In other words, think about how a memory leak can be a security vulnerability: fundamentally, it isn’t the actual vulnerability, but it’s what the memory leak can lead to that is the actual problem.

Consider another example from researchers. If a malicious actor was able to get on a machine which contained MDB files or could get ahold of large drops of MDB files, they could conduct an automated “dumpster diving” hunt through all of them to look for and collect sensitive information residing in these files that could be applied in any number of malicious uses.

Fortunately, to date, Mimecast researchers have not seen an exploit of this vulnerability in the wild, but it is easy to presume that it will soon be added to the repertoire of malicious actors in short order. To avoid this, follow security best practices, and patch Access database executables.

How to Defend Your Organisation

  • Regularly update your systems and applications for security vulnerabilities as they are patched by the vendor.
  • Once patched, consider opening and re-saving existing Microsoft Access MDB files to eliminate any unwanted content that may be resident in them.
  • Use an email security system with sophisticated malware detection capabilities which includes both static file analysis as well as sandboxing to filter malicious files from entering the organisation as well as sensitive content from leaving.
  • Monitor network traffic for connections to likely command-and-control services and for the exfiltration of potentially sensitive files.
  • Continuously update endpoint security system to increase the likelihood of detecting malicious software running on these hosts.
Tags: datafeatured2Matthew GardinerMicrosoftMicrosoft Access DatabaseMimecastSecurity
ShareTweet

Related Posts

Empowering the UAE’s digital future through data sovereignty
Opinions

Empowering the UAE’s digital future through data sovereignty

As the UAE continues to lead the charge in technological innovation, the importance of data sovereignty has never been more...

May 26, 2025
AI agents are set to become an indispensable part of the GCC security apparatus
Opinions

AI agents are set to become an indispensable part of the GCC security apparatus

Middle Eastern countries continue to bet big on AI—and for good reason. National strategies like the UAE Artificial Intelligence Strategy...

May 23, 2025

Discussion about this post

Latest Issue

CVC Joins CD&R as an Investment Partner in Epicor

VAST Data and Cisco expand partnership

June 4, 2025
JAGGAER appoints first Chief Digital & AI Officer

JAGGAER appoints first Chief Digital & AI Officer

June 4, 2025
training skills ups killing

Huawei partners with Nafis to launch Emirati Talent Development Programme

June 4, 2025

The most trusted source of strategic intelligence for IT decision makers in the Middle East.

About

  • About Us
  • Advertising
  • Digital Magazine
  • Supplements
  • Media Pack
  • Contact Us

Policies

  • Privacy Policy

© 2024 – CXO Insight Middle East. All Rights Reserved.

Facebook-f X-twitter Linkedin
Separated they live in Bookmarksgrove right at the coast of the Semantics, a large language ocean. A small river named Duden.

About

  • About Us
  • Site Map
  • Contact Us
  • Career

Policies

  • Help Center
  • Privacy Policy
  • Cookie Setting
  • Term Of Use

Join Our Newsletter

© 2024 – CXO Insight Middle East. All Rights Reserved.

Facebook-f Twitter Youtube Instagram

Welcome Back!

Login to your account below

Forgotten Password?

Retrieve your password

Please enter your username or email address to reset your password.

Log In
Join our mailing list
Sign up here to get the latest news, updates and special offers delivered directly to your inbox.
No Result
View All Result
  • News
  • Opinions
  • Business
    • Industries
      • Transport
      • Retail
      • Government
      • Real Estate
      • Education
      • Energy
      • Banking and Finance
  • Channel
  • Future
    • Tech
    • Gadgets
    • Science
    • Space
    • Sustainability
  • Events
    • Channel Insights Summit 2025
    • Insight Innovation Summit
    • CX50 Oman
    • CXO50
    • ICT Awards
      • Dubai
      • Saudi Arabia
    • Cyber Strategists Summit
    • Cloud Connect
    • Channel Awards 2023
    • All events
  • Videos
  • GITEX GLOBAL
  • Digital Magazine

© 2024 - CXO Insight Middle East. All Rights Reserved.