Team82 has made freely available a tool called AccessDB Parser
The Python-based AccessDB Parser supports software testing, fuzzing, research, and other activities
It supports Microsoft Access versions 1995 up to 2010
Team82 today shares AccessDB Parser, a new, purpose-built tool we developed to support activities such as testing, automation, fuzzing, and reverse-engineering research, among others. The standalone tool—which can be used to quickly parse through Microsoft AccessDB files (.mdb/.accdb)—is fully written in Python, thus eliminating any external binary dependencies.
Our parser supports Microsoft Access versions 1995 up to 2010. Microsoft Access is a database management system from Microsoft that combines the relational Microsoft Jet Database Engine with a graphical user interface (GUI) and software-development tools. It is a member of the Microsoft Office suite of applications, included in the Professional and higher editions or sold separately.
According to Claroty Researcher Uri Katz, who led the development of AccessDB Parser, the initial purpose of the tool was to support Claroty Continuous Threat Detection (CTD)'s Application DB (AppDB) scanning capabilities. Unique to Claroty, AppDB provides a safe, effective, and non-intrusive method for identifying and managing assets in operational technology (OT) environments by parsing artifacts such as programmable logic controller (PLC) and remote terminal unit (RTU) project configuration files.
As part of Claroty's efforts to deliver the highest level of visibility into OT environments, we sought to develop a tool that would allow AppDB to process additional types of SCADA project files containing .mdb files. In addition, we wanted this tool to allow us to create multiple tests, verify test results, and automate some of our testing processes.
To address these needs, we decided to invest time in developing our own parsing tool, below, which could easily be modified and improved on an ongoing basis as our needs evolve. We ensured to make the tool open-source, knowing that it would likely prove useful for other reverse engineers.
C Implementation: Our library of tools relies heavily on the well-documented work of mdb-tools, which can be accessed here.
Java Implementation: We also benefited greatly from Jackcess, an all-Java library for reading from and writing to MS Access databases, currently supporting versions 2000-2016. Jackcess is not an application and does not have a GUI. Rather, it is intended to help developers build Java applications.
OLE fields are currently not supported.
Only a subset of memo fields are parsed.
This library was tested on a limited subset of database files. Due to the differences between database versions and the complexity of the parsing, we expect to find more parsing edge-cases.
To help us resolve issues faster, please provide as much data as possible when opening an issue, including the DB file if possible, as well as full trace, including log messages.
Click here to watch a demo of Claroty AccessDB Parser
Click here to download the tool on Claroty's GitHub repository
CWE-120 BUFFER COPY WITHOUT CHECKING SIZE OF INPUT ('CLASSIC BUFFER OVERFLOW'):
A denial-of-service vulnerability exists in the affected product. The vulnerability results in a buffer overflow, potentially causing denial-of-service condition.
Rockwell Automation has corrected these problems in firmware revision 4.020 and recommends users upgrade to the latest version available.
CVSS v3: 9.8
CWE-122 HEAP-BASED BUFFER OVERFLOW:
A denial-of-service and possible remote code execution vulnerability exists in the affected product. The vulnerability results in the corruption of the heap memory, which may compromise the integrity of the system, potentially allowing for remote code execution or a denial-of-service attack.
Rockwell Automation has corrected these problems in firmware revision 4.020 and recommends users upgrade to the latest version available.
CVSS v3: 9.8
CWE-420 UNPROTECTED ALTERNATE CHANNEL:
A device takeover vulnerability exists in the affected product. This vulnerability allows configuration of a new Policyholder user without any authentication via API. Policyholder user is the most privileged user that can perform edit operations, creating admin users and performing factory reset.
Rockwell Automation has corrected these problems in firmware revision 4.020 and recommends users upgrade to the latest version available.
CVSS v3: 9.8
CWE-191 INTEGER UNDERFLOW (WRAP OR WRAPAROUND):
The affected product is vulnerable to an integer underflow. An unauthenticated attacker could send a malformed HTTP Requesty, which could allow the attacker to crash the program.
Planet Technology recommends users upgrade to version 1.305b241111 or later.
CVSS v3: 5.3
CWE-78 IMPROPER NEUTRALIZATION OF SPECIAL ELEMENTS USED IN AN OS COMMAND ('OS COMMAND INJECTION'):
The affected product is vulnerable to a command injection. An unauthenticated attacker could send commands through a malicious HTTP request which could result in remote code execution.
Planet Technology recommends users upgrade to version 1.305b241111 or later.
CVSS v3: 9.8