Fortinet Discovers Microsoft Office Access Connectivity Engine Remote Code Execution Vulnerability
Fortinet's FortiGuard Labs has discovered a remote code execution vulnerability in the Microsoft Office Access Connectivity Engine.
Microsoft Office Access Connectivity Engine is an Office-specific version of JET engine which is included in Microsoft Access. The Microsoft JET Database Engine is a database engine on which several Microsoft products have been built. A database engine is the underlying component of a database, a collection of information stored on a computer in a systematic way.
The vulnerability in the Microsoft Office Access Connectivity Engine could allow remote code execution on an affected system. An attacker who successfully exploited this vulnerability could take control of the victim system. To exploit the vulnerability, a user must open a specially crafted file while using an affected version of Microsoft Windows.
SolutionsFortiGuard Labs released the following FortiGate IPS signature which covers this specific vulnerability:
Released Apr 09, 2019
Users should apply the solution provided by Microsoft.
Fortinet reported the vulnerability to Microsoft on February 8, 2019.
Microsoft confirmed the vulnerability on February 21, 2019.
Microsoft patched the vulnerability on April 9, 2019.
This vulnerability was discovered by Honggang Ren of Fortinet's FortiGuard Labs.