{"id":96131,"date":"2019-07-30T08:53:30","date_gmt":"2019-07-30T15:53:30","guid":{"rendered":"https:\/\/securingtomorrow.mcafee.com\/?p=96131"},"modified":"2024-02-18T19:05:38","modified_gmt":"2024-02-19T03:05:38","slug":"jet-database-engine-flaw-may-lead-to-exploitation-analyzing-cve-2018-8423","status":"publish","type":"post","link":"https:\/\/www.mcafee.com\/blogs\/other-blogs\/mcafee-labs\/jet-database-engine-flaw-may-lead-to-exploitation-analyzing-cve-2018-8423\/","title":{"rendered":"Jet Database Engine Flaw May Lead to Exploitation: Analyzing CVE-2018-8423"},"content":{"rendered":"<p>In September 2018, the Zero Day Initiative published a <a href=\"https:\/\/github.com\/thezdi\/PoC\/tree\/master\/ZDI-18-1075\" target=\"_blank\" rel=\"noopener noreferrer\">proof of concept<\/a> for a vulnerability in Microsoft\u2019s Jet Database Engine. Microsoft released a patch in October 2018. We investigated this flaw at that time to protect our customers. We were able to find some issues with the patch and reported that to Microsoft, which resulted in another vulnerability, <a href=\"https:\/\/portal.msrc.microsoft.com\/en-us\/security-guidance\/advisory\/CVE-2019-0576\" target=\"_blank\" rel=\"noopener noreferrer\">CVE-2019-0576<\/a>, which was fixed on 8-Jan-2018 (Microsoft Jan 2019 Patch Tuesday).<\/p>\n<p>The vulnerability exploits the Microsoft Jet Database Engine, a component used in many Microsoft applications, including Access. The flaw allows an attacker to execute code to escalate privileges or to download malware. We do not know if the vulnerability is used in any attacks; however, the proof of concept code is widely available.<\/p>\n<h3>Overview<\/h3>\n<p>To exploit this vulnerability, an attacker needs to use social engineering techniques to convince a victim to open a JavaScript file which uses an ADODB connection object to access a malicious Jet Database file. Once the malicious Jet database file is accessed, it calls the vulnerable function in msrd3x40.dll which can lead to exploitation of this vulnerability.<\/p>\n<p>Although the available proof of concept causes a crash in wscript.exe, any application using this DLL is susceptible to the attack.<\/p>\n<p>The following error message indicates the vulnerability was successfully triggered:<\/p>\n<p><img loading=\"lazy\" decoding=\"async\" class=\"aligncenter size-full wp-image-96132\" src=\"https:\/\/securingtomorrow.mcafee.com\/wp-content\/uploads\/2019\/07\/error-message-1.png\" alt=\"\" width=\"836\" height=\"216\" srcset=\"https:\/\/www.mcafee.com\/blogs\/wp-content\/uploads\/2019\/07\/error-message-1.png 836w, https:\/\/www.mcafee.com\/blogs\/wp-content\/uploads\/2019\/07\/error-message-1-300x78.png 300w, https:\/\/www.mcafee.com\/blogs\/wp-content\/uploads\/2019\/07\/error-message-1-768x198.png 768w\" sizes=\"auto, (max-width: 836px) 100vw, 836px\" \/><\/p>\n<p>The message shows an access violation occurred in the vulnerable DLL. This vulnerability is an <a href=\"https:\/\/cwe.mitre.org\/data\/definitions\/787.html\">\u201cout-of-bounds write<\/a>,\u201d which can be triggered via OLE DB, the API used to access data in many Microsoft applications. This type of vulnerability indicates that data can be written outside of the intended buffer, resulting in a crash. The cause of the crash is the maliciously crafted Jet database file. The file exploits an index field in the Jet database file format with an unexpectedly large number, resulting in an out-of-bounds write and, ultimately, the preceding crash.<\/p>\n<p>The following diagram provides a high-level view of how the exploit works:<\/p>\n<p><img loading=\"lazy\" decoding=\"async\" class=\"aligncenter size-full wp-image-96133\" src=\"https:\/\/securingtomorrow.mcafee.com\/wp-content\/uploads\/2019\/07\/exploit-in-action.png\" alt=\"\" width=\"1204\" height=\"1508\" srcset=\"https:\/\/www.mcafee.com\/blogs\/wp-content\/uploads\/2019\/07\/exploit-in-action.png 1204w, https:\/\/www.mcafee.com\/blogs\/wp-content\/uploads\/2019\/07\/exploit-in-action-240x300.png 240w, https:\/\/www.mcafee.com\/blogs\/wp-content\/uploads\/2019\/07\/exploit-in-action-768x962.png 768w, https:\/\/www.mcafee.com\/blogs\/wp-content\/uploads\/2019\/07\/exploit-in-action-818x1024.png 818w, https:\/\/www.mcafee.com\/blogs\/wp-content\/uploads\/2019\/07\/exploit-in-action-399x500.png 399w\" sizes=\"auto, (max-width: 1204px) 100vw, 1204px\" \/><\/p>\n<h3>Exploit in Action<\/h3>\n<p>The proof of concept code contains one JavaScript file (poc.js), which calls a second file (group1). This is the Jet database file. By running poc.js through wscript.exe, we can trigger the crash.<\/p>\n<p><img loading=\"lazy\" decoding=\"async\" class=\"aligncenter size-full wp-image-96134\" src=\"https:\/\/securingtomorrow.mcafee.com\/wp-content\/uploads\/2019\/07\/triggering-the-crash.png\" alt=\"\" width=\"740\" height=\"135\" srcset=\"https:\/\/www.mcafee.com\/blogs\/wp-content\/uploads\/2019\/07\/triggering-the-crash.png 740w, https:\/\/www.mcafee.com\/blogs\/wp-content\/uploads\/2019\/07\/triggering-the-crash-300x55.png 300w\" sizes=\"auto, (max-width: 740px) 100vw, 740px\" \/><\/p>\n<p>As we see in the preceding image, we can review debug information to determine the function that crashes is \u201cmsrd3x40!TblPage::CreateIndexes.\u201d Furthermore, we can determine that the program is trying to write data and failing. Specifically, we can see that the program is using the \u201cesi\u201d register to write to the location [edx+ecx*4+574h], but that location is not accessible.<\/p>\n<p>We need to understand how this location is constructed to provide clues to the root cause. The debug information shows that register ecx contains the value 0x00002300. Edx is a pointer to memory that we will see again later. Finally, they are added together with an offset of 574 hexadecimal bytes to reference the memory location. From this information, we can guess the type of data that is stored there. It appears to be an array in which each variable is 4 bytes long and starts at the location edx+574h. While tracking the program, we determined the value 0x00002300 comes from the proof-of-concept file group1.<\/p>\n<p><img loading=\"lazy\" decoding=\"async\" class=\"aligncenter size-full wp-image-96135\" src=\"https:\/\/securingtomorrow.mcafee.com\/wp-content\/uploads\/2019\/07\/file-group1.png\" alt=\"\" width=\"881\" height=\"181\" srcset=\"https:\/\/www.mcafee.com\/blogs\/wp-content\/uploads\/2019\/07\/file-group1.png 881w, https:\/\/www.mcafee.com\/blogs\/wp-content\/uploads\/2019\/07\/file-group1-300x62.png 300w, https:\/\/www.mcafee.com\/blogs\/wp-content\/uploads\/2019\/07\/file-group1-768x158.png 768w\" sizes=\"auto, (max-width: 881px) 100vw, 881px\" \/><\/p>\n<p>We know that the program attempts to write out of bounds and we know where the attempt occurs. Now we need to determine why the program attempts to write at that location. We investigate the user-provided data of 0x00002300 to understand its purpose. To do this we must understand the Jet database file.<\/p>\n<h2>Analyzing the Jet Database File<\/h2>\n<p>Many researchers have extensively analyzed the Jet database file structure. Some of the details of previous work can be found at the following links:<\/p>\n<ul>\n<li><a href=\"http:\/\/jabakobob.net\/mdb\/\" target=\"_blank\" rel=\"noopener noreferrer\">Jabakobob.net<\/a><\/li>\n<li><a href=\"https:\/\/github.com\/brianb\/mdbtools\/blob\/master\/HACKING\" target=\"_blank\" rel=\"noopener noreferrer\">Brian B GitHub<\/a><\/li>\n<\/ul>\n<p>To summarize, a Jet database file is organized as a collection of pages, as shown in the following image:<\/p>\n<p><img loading=\"lazy\" decoding=\"async\" class=\"aligncenter size-full wp-image-96136\" src=\"https:\/\/securingtomorrow.mcafee.com\/wp-content\/uploads\/2019\/07\/JetDB-file.png\" alt=\"\" width=\"364\" height=\"383\" srcset=\"https:\/\/www.mcafee.com\/blogs\/wp-content\/uploads\/2019\/07\/JetDB-file.png 364w, https:\/\/www.mcafee.com\/blogs\/wp-content\/uploads\/2019\/07\/JetDB-file-285x300.png 285w, https:\/\/www.mcafee.com\/blogs\/wp-content\/uploads\/2019\/07\/JetDB-file-24x24.png 24w\" sizes=\"auto, (max-width: 364px) 100vw, 364px\" \/><\/p>\n<p>The header page contains various information related to the file:<\/p>\n<p><img loading=\"lazy\" decoding=\"async\" class=\"aligncenter size-full wp-image-96137\" src=\"https:\/\/securingtomorrow.mcafee.com\/wp-content\/uploads\/2019\/07\/header-page.png\" alt=\"\" width=\"1182\" height=\"423\" srcset=\"https:\/\/www.mcafee.com\/blogs\/wp-content\/uploads\/2019\/07\/header-page.png 1182w, https:\/\/www.mcafee.com\/blogs\/wp-content\/uploads\/2019\/07\/header-page-300x107.png 300w, https:\/\/www.mcafee.com\/blogs\/wp-content\/uploads\/2019\/07\/header-page-768x275.png 768w, https:\/\/www.mcafee.com\/blogs\/wp-content\/uploads\/2019\/07\/header-page-1024x366.png 1024w\" sizes=\"auto, (max-width: 1182px) 100vw, 1182px\" \/><\/p>\n<p>After the header come 126 bytes, RC4 encrypted, with the specific key 0x6b39dac7, which is the same for every JetDB file. Comparing the key value with the proof-of-concept file, we can identify that group1 is a Jet Version 3 file.<\/p>\n<p>Further examination leads to a Table Definition Pages section, which describes various data structures for a table. <a href=\"http:\/\/jabakobob.net\/mdb\/table-page.html\">(Click here for details.) <\/a><\/p>\n<p>The table definition data has various fields, including two of note: Index Count and Real Index Count.<\/p>\n<p><img loading=\"lazy\" decoding=\"async\" class=\"aligncenter size-full wp-image-96138\" src=\"https:\/\/securingtomorrow.mcafee.com\/wp-content\/uploads\/2019\/07\/table-definition-data.png\" alt=\"\" width=\"1289\" height=\"642\" srcset=\"https:\/\/www.mcafee.com\/blogs\/wp-content\/uploads\/2019\/07\/table-definition-data.png 1289w, https:\/\/www.mcafee.com\/blogs\/wp-content\/uploads\/2019\/07\/table-definition-data-300x149.png 300w, https:\/\/www.mcafee.com\/blogs\/wp-content\/uploads\/2019\/07\/table-definition-data-768x383.png 768w, https:\/\/www.mcafee.com\/blogs\/wp-content\/uploads\/2019\/07\/table-definition-data-1024x510.png 1024w, https:\/\/www.mcafee.com\/blogs\/wp-content\/uploads\/2019\/07\/table-definition-data-1004x500.png 1004w\" sizes=\"auto, (max-width: 1289px) 100vw, 1289px\" \/><\/p>\n<p>We can determine the value of these in our proof-of-concept file. When we check this with the group1 file, we see following:<\/p>\n<p><img loading=\"lazy\" decoding=\"async\" class=\"aligncenter size-full wp-image-96139\" src=\"https:\/\/securingtomorrow.mcafee.com\/wp-content\/uploads\/2019\/07\/proof-of-concept-file.png\" alt=\"\" width=\"540\" height=\"376\" srcset=\"https:\/\/www.mcafee.com\/blogs\/wp-content\/uploads\/2019\/07\/proof-of-concept-file.png 540w, https:\/\/www.mcafee.com\/blogs\/wp-content\/uploads\/2019\/07\/proof-of-concept-file-300x209.png 300w\" sizes=\"auto, (max-width: 540px) 100vw, 540px\" \/><\/p>\n<p>There are total of two indexes in the Index Count. When we parse both indexes we see the familiar value of 0x00002300:<\/p>\n<p><img loading=\"lazy\" decoding=\"async\" class=\"aligncenter size-full wp-image-96140\" src=\"https:\/\/securingtomorrow.mcafee.com\/wp-content\/uploads\/2019\/07\/two-indexes.png\" alt=\"\" width=\"641\" height=\"542\" srcset=\"https:\/\/www.mcafee.com\/blogs\/wp-content\/uploads\/2019\/07\/two-indexes.png 641w, https:\/\/www.mcafee.com\/blogs\/wp-content\/uploads\/2019\/07\/two-indexes-300x254.png 300w, https:\/\/www.mcafee.com\/blogs\/wp-content\/uploads\/2019\/07\/two-indexes-591x500.png 591w\" sizes=\"auto, (max-width: 641px) 100vw, 641px\" \/><\/p>\n<p>Our offending value 0x00230000 is the index number for index2 in the table. This index seems rather large and leads to the crash. Why does it crash the program? Further parsing the file, we find the names of the two indexes:<\/p>\n<p><img loading=\"lazy\" decoding=\"async\" class=\"aligncenter size-full wp-image-96141\" src=\"https:\/\/securingtomorrow.mcafee.com\/wp-content\/uploads\/2019\/07\/index-names.png\" alt=\"\" width=\"516\" height=\"208\" srcset=\"https:\/\/www.mcafee.com\/blogs\/wp-content\/uploads\/2019\/07\/index-names.png 516w, https:\/\/www.mcafee.com\/blogs\/wp-content\/uploads\/2019\/07\/index-names-300x121.png 300w\" sizes=\"auto, (max-width: 516px) 100vw, 516px\" \/><\/p>\n<h3>Debugging<\/h3>\n<p>With a debugger attached, we can see that first program calls the function \u201cmsrd3x40!operator new.\u201d This allocates memory that stores the memory pointer address in eax:<\/p>\n<p><img loading=\"lazy\" decoding=\"async\" class=\"aligncenter size-full wp-image-96142\" src=\"https:\/\/securingtomorrow.mcafee.com\/wp-content\/uploads\/2019\/07\/allocated-memory.png\" alt=\"\" width=\"740\" height=\"793\" srcset=\"https:\/\/www.mcafee.com\/blogs\/wp-content\/uploads\/2019\/07\/allocated-memory.png 740w, https:\/\/www.mcafee.com\/blogs\/wp-content\/uploads\/2019\/07\/allocated-memory-280x300.png 280w, https:\/\/www.mcafee.com\/blogs\/wp-content\/uploads\/2019\/07\/allocated-memory-467x500.png 467w\" sizes=\"auto, (max-width: 740px) 100vw, 740px\" \/><\/p>\n<p>After the memory is allocated, the program creates the new index:<\/p>\n<p><img loading=\"lazy\" decoding=\"async\" class=\"aligncenter size-full wp-image-96143\" src=\"https:\/\/securingtomorrow.mcafee.com\/wp-content\/uploads\/2019\/07\/new-index.png\" alt=\"\" width=\"778\" height=\"636\" srcset=\"https:\/\/www.mcafee.com\/blogs\/wp-content\/uploads\/2019\/07\/new-index.png 778w, https:\/\/www.mcafee.com\/blogs\/wp-content\/uploads\/2019\/07\/new-index-300x245.png 300w, https:\/\/www.mcafee.com\/blogs\/wp-content\/uploads\/2019\/07\/new-index-768x628.png 768w, https:\/\/www.mcafee.com\/blogs\/wp-content\/uploads\/2019\/07\/new-index-612x500.png 612w\" sizes=\"auto, (max-width: 778px) 100vw, 778px\" \/><\/p>\n<p>This index number is used later in the execution. The function msrd3x40!Index::Restore copies that index number to the index address + 24h. This process is repeated in a loop for all indexes. First it calls the \u201cnew\u201d operator, which allocates the memory. It then creates an index on that address and moves the index number to the base address of the index +24h. We see this move in the following code, which shows the malicious index value copied to newly created index:<\/p>\n<p><img loading=\"lazy\" decoding=\"async\" class=\"aligncenter size-full wp-image-96144\" src=\"https:\/\/securingtomorrow.mcafee.com\/wp-content\/uploads\/2019\/07\/malicious-index.png\" alt=\"\" width=\"740\" height=\"576\" srcset=\"https:\/\/www.mcafee.com\/blogs\/wp-content\/uploads\/2019\/07\/malicious-index.png 740w, https:\/\/www.mcafee.com\/blogs\/wp-content\/uploads\/2019\/07\/malicious-index-300x234.png 300w, https:\/\/www.mcafee.com\/blogs\/wp-content\/uploads\/2019\/07\/malicious-index-642x500.png 642w\" sizes=\"auto, (max-width: 740px) 100vw, 740px\" \/><\/p>\n<p>Once successfully moved, the function msrd3x40!NamedObject::Rename is called and copies the index name value to the index address +40h:<\/p>\n<p><img loading=\"lazy\" decoding=\"async\" class=\"aligncenter size-full wp-image-96145\" src=\"https:\/\/securingtomorrow.mcafee.com\/wp-content\/uploads\/2019\/07\/40h.png\" alt=\"\" width=\"938\" height=\"617\" srcset=\"https:\/\/www.mcafee.com\/blogs\/wp-content\/uploads\/2019\/07\/40h.png 938w, https:\/\/www.mcafee.com\/blogs\/wp-content\/uploads\/2019\/07\/40h-300x197.png 300w, https:\/\/www.mcafee.com\/blogs\/wp-content\/uploads\/2019\/07\/40h-768x505.png 768w, https:\/\/www.mcafee.com\/blogs\/wp-content\/uploads\/2019\/07\/40h-760x500.png 760w\" sizes=\"auto, (max-width: 938px) 100vw, 938px\" \/><\/p>\n<p>If we look at the esi register, we see it points to the address of the index. The ecx register has a value of [esi+24h], which is the index number:<\/p>\n<p><img loading=\"lazy\" decoding=\"async\" class=\"aligncenter size-full wp-image-96146\" src=\"https:\/\/securingtomorrow.mcafee.com\/wp-content\/uploads\/2019\/07\/esi-register.png\" alt=\"\" width=\"1643\" height=\"390\" srcset=\"https:\/\/www.mcafee.com\/blogs\/wp-content\/uploads\/2019\/07\/esi-register.png 1643w, https:\/\/www.mcafee.com\/blogs\/wp-content\/uploads\/2019\/07\/esi-register-300x71.png 300w, https:\/\/www.mcafee.com\/blogs\/wp-content\/uploads\/2019\/07\/esi-register-768x182.png 768w, https:\/\/www.mcafee.com\/blogs\/wp-content\/uploads\/2019\/07\/esi-register-1024x243.png 1024w\" sizes=\"auto, (max-width: 1643px) 100vw, 1643px\" \/><\/p>\n<p>After a few more instructions, we can observe the original crash instructions. Edx points to the memory location. Ecx contains a very large number from the file group1. The program tries to access memory at location [edx+ecx*4+574h], which will cause the out-of-bounds write and the program crashes:<\/p>\n<p><img loading=\"lazy\" decoding=\"async\" class=\"aligncenter size-full wp-image-96147\" src=\"https:\/\/securingtomorrow.mcafee.com\/wp-content\/uploads\/2019\/07\/crash.png\" alt=\"\" width=\"1706\" height=\"625\" srcset=\"https:\/\/www.mcafee.com\/blogs\/wp-content\/uploads\/2019\/07\/crash.png 1706w, https:\/\/www.mcafee.com\/blogs\/wp-content\/uploads\/2019\/07\/crash-300x110.png 300w, https:\/\/www.mcafee.com\/blogs\/wp-content\/uploads\/2019\/07\/crash-768x281.png 768w, https:\/\/www.mcafee.com\/blogs\/wp-content\/uploads\/2019\/07\/crash-1024x375.png 1024w, https:\/\/www.mcafee.com\/blogs\/wp-content\/uploads\/2019\/07\/crash-1365x500.png 1365w\" sizes=\"auto, (max-width: 1706px) 100vw, 1706px\" \/><\/p>\n<p>What is happening with the data the program tries to write? If we watch the instructions, we see that program tries to write the value of esi to [edx+ecx*4+574]. If we print esi or the previous value, we see that it contains the index name ParentIdName, which we saw in group1:<\/p>\n<p><img loading=\"lazy\" decoding=\"async\" class=\"aligncenter size-full wp-image-96148\" src=\"https:\/\/securingtomorrow.mcafee.com\/wp-content\/uploads\/2019\/07\/ParentIdName.png\" alt=\"\" width=\"957\" height=\"367\" srcset=\"https:\/\/www.mcafee.com\/blogs\/wp-content\/uploads\/2019\/07\/ParentIdName.png 957w, https:\/\/www.mcafee.com\/blogs\/wp-content\/uploads\/2019\/07\/ParentIdName-300x115.png 300w, https:\/\/www.mcafee.com\/blogs\/wp-content\/uploads\/2019\/07\/ParentIdName-768x295.png 768w\" sizes=\"auto, (max-width: 957px) 100vw, 957px\" \/><\/p>\n<p>&nbsp;<\/p>\n<p><img loading=\"lazy\" decoding=\"async\" class=\"aligncenter size-full wp-image-96149\" src=\"https:\/\/securingtomorrow.mcafee.com\/wp-content\/uploads\/2019\/07\/ParentIdName2.png\" alt=\"\" width=\"516\" height=\"208\" srcset=\"https:\/\/www.mcafee.com\/blogs\/wp-content\/uploads\/2019\/07\/ParentIdName2.png 516w, https:\/\/www.mcafee.com\/blogs\/wp-content\/uploads\/2019\/07\/ParentIdName2-300x121.png 300w\" sizes=\"auto, (max-width: 516px) 100vw, 516px\" \/><\/p>\n<p>Ultimately, the program crashes while trying to process ParentIDName with a very large index number. The logic:<\/p>\n<ul>\n<li>Allocate the memory and get the pointer to the start of the memory location.<\/li>\n<li>From the start of memory location +574h, the program saves pointers to index names with each occupying 4 bytes multiplied by the index number mentioned in the file.<\/li>\n<\/ul>\n<p>If the index number is very large, as in this case, and no validation is done, then the program will try to write out of bounds and crash.<\/p>\n<h3>Conclusion<\/h3>\n<p>This is a logic error and such errors are sometimes hard to catch. Many developers take extra precautions to avoid these types of bugs in their code. It is even more unfortunate when these bugs lead to serious security issues such as with CVE-2018-8423. When these issues are discovered and patched, we recommend applying the vendor patch as soon as possible to reduce your security risks.<\/p>\n<p>Microsoft patches can be downloaded and installed from the following locations for respective CVEs:<\/p>\n<p><strong>CVE-2018-8423<\/strong><\/p>\n<p><a href=\"https:\/\/portal.msrc.microsoft.com\/en-US\/security-guidance\/advisory\/CVE-2018-8423\" target=\"_blank\" rel=\"noopener noreferrer\">https:\/\/portal.msrc.microsoft.com\/en-US\/security-guidance\/advisory\/CVE-2018-8423<\/a><\/p>\n<p><strong>CVE-2019-0576<\/strong><\/p>\n<p><a href=\"https:\/\/portal.msrc.microsoft.com\/en-US\/security-guidance\/advisory\/CVE-2019-0576\" target=\"_blank\" rel=\"noopener noreferrer\">https:\/\/portal.msrc.microsoft.com\/en-US\/security-guidance\/advisory\/CVE-2019-0576<\/a><\/p>\n<h3>McAfee Detection:<\/h3>\n<p>McAfee Network Security Platform customers are protected from this vulnerability by Signature IDs 0x45251700 \u2013 HTTP: Microsoft JET Database Engine Remote Code Execution Vulnerability (CVE-2018-8423) and 0x4525890 &#8211; HTTP: Microsoft JET Database Engine Remote Code Execution Vulnerability (CVE-2019-0576).<\/p>\n<p>McAfee AV detects malicious file as <strong><a href=\"https:\/\/www.virustotal.com\/gui\/search\/mcafee_gw-edition%253A%2522BackDoor-DKI.dr%2522\" target=\"_blank\" rel=\"noopener noreferrer\">BackDoor-DKI.dr<\/a> .<\/strong><\/p>\n<p>McAfee HIPS, GBOP (Generic Buffer Overflow Protection) feature might cover this, depending on the process used to exploit the vulnerability.<\/p>\n<p><em>We thank Steve Povolny of McAfee\u2019s Advanced Threat Research team, and Bing Sun and Imran Ebrahim of McAfee\u2019s Hybrid Gateway Security team for their support and guidance with this analysis.<\/em><\/p>\n<p><strong>\u00a0<\/strong><\/p>\n<p><strong>References<\/strong><\/p>\n<ul>\n<li><a href=\"https:\/\/github.com\/brianb\/mdbtools\/blob\/master\/HACKING\" target=\"_blank\" rel=\"noopener noreferrer\">https:\/\/github.com\/brianb\/mdbtools\/blob\/master\/HACKING<\/a><\/li>\n<li><a href=\"http:\/\/jabakobob.net\/mdb\/table-page.html\" target=\"_blank\" rel=\"noopener noreferrer\">http:\/\/jabakobob.net\/mdb\/table-page.html<\/a><\/li>\n<\/ul>\n","protected":false},"excerpt":{"rendered":"<p>In September 2018, the Zero Day Initiative published a proof of concept for a vulnerability in Microsoft\u2019s Jet Database Engine&#8230;.<\/p>\n","protected":false},"author":612,"featured_media":95077,"comment_status":"closed","ping_status":"closed","sticky":false,"template":"","format":"standard","meta":{"_acf_changed":false,"footnotes":""},"categories":[442],"tags":[5526],"coauthors":[2095,5016,4688],"class_list":["post-96131","post","type-post","status-publish","format-standard","has-post-thumbnail","hentry","category-mcafee-labs","tag-advanced-threat-research"],"acf":[],"yoast_head":"<!-- This site is optimized with the Yoast SEO plugin v25.4 - https:\/\/yoast.com\/wordpress\/plugins\/seo\/ -->\n<title>Jet Database Engine Flaw May Lead to Exploitation: Analyzing CVE-2018-8423 | McAfee Blog<\/title>\n<meta name=\"description\" content=\"In September 2018, the Zero Day Initiative published a proof of concept for a vulnerability in Microsoft\u2019s Jet Database Engine. Microsoft released a patch\" \/>\n<meta name=\"robots\" content=\"index, follow, max-snippet:-1, max-image-preview:large, max-video-preview:-1\" \/>\n<meta property=\"og:locale\" content=\"en_US\" \/>\n<meta property=\"og:type\" content=\"article\" \/>\n<meta property=\"og:title\" content=\"Jet Database Engine Flaw May Lead to Exploitation: Analyzing CVE-2018-8423 | McAfee Blog\" \/>\n<meta property=\"og:description\" content=\"In September 2018, the Zero Day Initiative published a proof of concept for a vulnerability in Microsoft\u2019s Jet Database Engine. Microsoft released a patch\" \/>\n<meta property=\"og:url\" content=\"https:\/\/www.mcafee.com\/blogs\/other-blogs\/mcafee-labs\/jet-database-engine-flaw-may-lead-to-exploitation-analyzing-cve-2018-8423\/\" \/>\n<meta property=\"og:site_name\" content=\"McAfee Blog\" \/>\n<meta property=\"article:publisher\" content=\"https:\/\/www.facebook.com\/McAfee\/\" \/>\n<meta property=\"article:published_time\" content=\"2019-07-30T15:53:30+00:00\" \/>\n<meta property=\"article:modified_time\" content=\"2024-02-19T03:05:38+00:00\" \/>\n<meta property=\"og:image\" content=\"https:\/\/www.mcafee.com\/blogs\/wp-content\/uploads\/2019\/04\/Global-Cyber-security-concept-copy.jpg\" \/>\n\t<meta property=\"og:image:width\" content=\"1575\" \/>\n\t<meta property=\"og:image:height\" content=\"1125\" \/>\n\t<meta property=\"og:image:type\" content=\"image\/jpeg\" \/>\n<meta name=\"author\" content=\"Hardik Shah, Charles McFarland, Thomas Roccia\" \/>\n<meta name=\"twitter:card\" content=\"summary_large_image\" \/>\n<meta name=\"twitter:creator\" content=\"@hardik05\" \/>\n<meta name=\"twitter:site\" content=\"@McAfee\" \/>\n<meta name=\"twitter:label1\" content=\"Written by\" \/>\n\t<meta name=\"twitter:data1\" content=\"Hardik Shah, Charles McFarland, Thomas Roccia\" \/>\n\t<meta name=\"twitter:label2\" content=\"Est. reading time\" \/>\n\t<meta name=\"twitter:data2\" content=\"7 minutes\" \/>\n<script type=\"application\/ld+json\" class=\"yoast-schema-graph\">{\"@context\":\"https:\/\/schema.org\",\"@graph\":[{\"@type\":\"Article\",\"@id\":\"https:\/\/www.mcafee.com\/blogs\/other-blogs\/mcafee-labs\/jet-database-engine-flaw-may-lead-to-exploitation-analyzing-cve-2018-8423\/#article\",\"isPartOf\":{\"@id\":\"https:\/\/www.mcafee.com\/blogs\/other-blogs\/mcafee-labs\/jet-database-engine-flaw-may-lead-to-exploitation-analyzing-cve-2018-8423\/\"},\"author\":{\"name\":\"Hardik Shah\",\"@id\":\"https:\/\/www.mcafee.com\/blogs\/#\/schema\/person\/99cb905e9b4051dfea96a7752dea4342\"},\"headline\":\"Jet Database Engine Flaw May Lead to Exploitation: Analyzing CVE-2018-8423\",\"datePublished\":\"2019-07-30T15:53:30+00:00\",\"dateModified\":\"2024-02-19T03:05:38+00:00\",\"mainEntityOfPage\":{\"@id\":\"https:\/\/www.mcafee.com\/blogs\/other-blogs\/mcafee-labs\/jet-database-engine-flaw-may-lead-to-exploitation-analyzing-cve-2018-8423\/\"},\"wordCount\":1399,\"publisher\":{\"@id\":\"https:\/\/www.mcafee.com\/blogs\/#organization\"},\"image\":{\"@id\":\"https:\/\/www.mcafee.com\/blogs\/other-blogs\/mcafee-labs\/jet-database-engine-flaw-may-lead-to-exploitation-analyzing-cve-2018-8423\/#primaryimage\"},\"thumbnailUrl\":\"https:\/\/www.mcafee.com\/blogs\/wp-content\/uploads\/2019\/04\/Global-Cyber-security-concept-copy.jpg\",\"keywords\":[\"Advanced Threat Research\"],\"articleSection\":[\"McAfee Labs\"],\"inLanguage\":\"en-US\"},{\"@type\":\"WebPage\",\"@id\":\"https:\/\/www.mcafee.com\/blogs\/other-blogs\/mcafee-labs\/jet-database-engine-flaw-may-lead-to-exploitation-analyzing-cve-2018-8423\/\",\"url\":\"https:\/\/www.mcafee.com\/blogs\/other-blogs\/mcafee-labs\/jet-database-engine-flaw-may-lead-to-exploitation-analyzing-cve-2018-8423\/\",\"name\":\"Jet Database Engine Flaw May Lead to Exploitation: Analyzing CVE-2018-8423 | McAfee Blog\",\"isPartOf\":{\"@id\":\"https:\/\/www.mcafee.com\/blogs\/#website\"},\"primaryImageOfPage\":{\"@id\":\"https:\/\/www.mcafee.com\/blogs\/other-blogs\/mcafee-labs\/jet-database-engine-flaw-may-lead-to-exploitation-analyzing-cve-2018-8423\/#primaryimage\"},\"image\":{\"@id\":\"https:\/\/www.mcafee.com\/blogs\/other-blogs\/mcafee-labs\/jet-database-engine-flaw-may-lead-to-exploitation-analyzing-cve-2018-8423\/#primaryimage\"},\"thumbnailUrl\":\"https:\/\/www.mcafee.com\/blogs\/wp-content\/uploads\/2019\/04\/Global-Cyber-security-concept-copy.jpg\",\"datePublished\":\"2019-07-30T15:53:30+00:00\",\"dateModified\":\"2024-02-19T03:05:38+00:00\",\"description\":\"In September 2018, the Zero Day Initiative published a proof of concept for a vulnerability in Microsoft\u2019s Jet Database Engine. Microsoft released a patch\",\"breadcrumb\":{\"@id\":\"https:\/\/www.mcafee.com\/blogs\/other-blogs\/mcafee-labs\/jet-database-engine-flaw-may-lead-to-exploitation-analyzing-cve-2018-8423\/#breadcrumb\"},\"inLanguage\":\"en-US\",\"potentialAction\":[{\"@type\":\"ReadAction\",\"target\":[\"https:\/\/www.mcafee.com\/blogs\/other-blogs\/mcafee-labs\/jet-database-engine-flaw-may-lead-to-exploitation-analyzing-cve-2018-8423\/\"]}]},{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\/\/www.mcafee.com\/blogs\/other-blogs\/mcafee-labs\/jet-database-engine-flaw-may-lead-to-exploitation-analyzing-cve-2018-8423\/#primaryimage\",\"url\":\"https:\/\/www.mcafee.com\/blogs\/wp-content\/uploads\/2019\/04\/Global-Cyber-security-concept-copy.jpg\",\"contentUrl\":\"https:\/\/www.mcafee.com\/blogs\/wp-content\/uploads\/2019\/04\/Global-Cyber-security-concept-copy.jpg\",\"width\":1575,\"height\":1125},{\"@type\":\"BreadcrumbList\",\"@id\":\"https:\/\/www.mcafee.com\/blogs\/other-blogs\/mcafee-labs\/jet-database-engine-flaw-may-lead-to-exploitation-analyzing-cve-2018-8423\/#breadcrumb\",\"itemListElement\":[{\"@type\":\"ListItem\",\"position\":1,\"name\":\"Blog\",\"item\":\"https:\/\/www.mcafee.com\/blogs\/\"},{\"@type\":\"ListItem\",\"position\":2,\"name\":\"Other Blogs\",\"item\":\"https:\/\/www.mcafee.com\/blogs\/other-blogs\/\"},{\"@type\":\"ListItem\",\"position\":3,\"name\":\"McAfee Labs\",\"item\":\"https:\/\/www.mcafee.com\/blogs\/other-blogs\/mcafee-labs\/\"},{\"@type\":\"ListItem\",\"position\":4,\"name\":\"Jet Database Engine Flaw May Lead to Exploitation: Analyzing CVE-2018-8423\"}]},{\"@type\":\"WebSite\",\"@id\":\"https:\/\/www.mcafee.com\/blogs\/#website\",\"url\":\"https:\/\/www.mcafee.com\/blogs\/\",\"name\":\"McAfee Blog\",\"description\":\"Internet Security News\",\"publisher\":{\"@id\":\"https:\/\/www.mcafee.com\/blogs\/#organization\"},\"potentialAction\":[{\"@type\":\"SearchAction\",\"target\":{\"@type\":\"EntryPoint\",\"urlTemplate\":\"https:\/\/www.mcafee.com\/blogs\/?s={search_term_string}\"},\"query-input\":{\"@type\":\"PropertyValueSpecification\",\"valueRequired\":true,\"valueName\":\"search_term_string\"}}],\"inLanguage\":\"en-US\"},{\"@type\":\"Organization\",\"@id\":\"https:\/\/www.mcafee.com\/blogs\/#organization\",\"name\":\"McAfee\",\"url\":\"https:\/\/www.mcafee.com\/blogs\/\",\"logo\":{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\/\/www.mcafee.com\/blogs\/#\/schema\/logo\/image\/\",\"url\":\"https:\/\/www.mcafee.com\/blogs\/wp-content\/uploads\/2023\/02\/mcafee-logo.png\",\"contentUrl\":\"https:\/\/www.mcafee.com\/blogs\/wp-content\/uploads\/2023\/02\/mcafee-logo.png\",\"width\":1286,\"height\":336,\"caption\":\"McAfee\"},\"image\":{\"@id\":\"https:\/\/www.mcafee.com\/blogs\/#\/schema\/logo\/image\/\"},\"sameAs\":[\"https:\/\/www.facebook.com\/McAfee\/\",\"https:\/\/x.com\/McAfee\",\"https:\/\/www.linkedin.com\/company\/mcafee\/\",\"https:\/\/www.youtube.com\/McAfee\"]},{\"@type\":\"Person\",\"@id\":\"https:\/\/www.mcafee.com\/blogs\/#\/schema\/person\/99cb905e9b4051dfea96a7752dea4342\",\"name\":\"Hardik Shah\",\"image\":{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\/\/www.mcafee.com\/blogs\/#\/schema\/person\/image\/b151596c8b1a8dc9b25ec3b19ccfd8c0\",\"url\":\"https:\/\/secure.gravatar.com\/avatar\/2b87a13b8b83a589e5494d7db597ad6a?s=96&d=mm&r=g\",\"contentUrl\":\"https:\/\/secure.gravatar.com\/avatar\/2b87a13b8b83a589e5494d7db597ad6a?s=96&d=mm&r=g\",\"caption\":\"Hardik Shah\"},\"description\":\"Hardik Shah, a Senior Research Engineer in McAfee Labs, is an experienced security researcher and technology evangelist. He has extensive experience with exploits, malware analysis, and various IPS engines. Shah enjoys figuring out ways to protect customers from the latest threats. Prior to McAfee, he worked with the IPS research team at Symantec. You can follow him on twitter at @hardik05\",\"sameAs\":[\"https:\/\/www.linkedin.com\/in\/hardik05\/\",\"https:\/\/x.com\/hardik05\"],\"url\":\"https:\/\/www.mcafee.com\/blogs\/author\/hardik-shah\/\"}]}<\/script>\n<!-- \/ Yoast SEO plugin. -->","yoast_head_json":{"title":"Jet Database Engine Flaw May Lead to Exploitation: Analyzing CVE-2018-8423 | McAfee Blog","description":"In September 2018, the Zero Day Initiative published a proof of concept for a vulnerability in Microsoft\u2019s Jet Database Engine. Microsoft released a patch","robots":{"index":"index","follow":"follow","max-snippet":"max-snippet:-1","max-image-preview":"max-image-preview:large","max-video-preview":"max-video-preview:-1"},"og_locale":"en_US","og_type":"article","og_title":"Jet Database Engine Flaw May Lead to Exploitation: Analyzing CVE-2018-8423 | McAfee Blog","og_description":"In September 2018, the Zero Day Initiative published a proof of concept for a vulnerability in Microsoft\u2019s Jet Database Engine. Microsoft released a patch","og_url":"https:\/\/www.mcafee.com\/blogs\/other-blogs\/mcafee-labs\/jet-database-engine-flaw-may-lead-to-exploitation-analyzing-cve-2018-8423\/","og_site_name":"McAfee Blog","article_publisher":"https:\/\/www.facebook.com\/McAfee\/","article_published_time":"2019-07-30T15:53:30+00:00","article_modified_time":"2024-02-19T03:05:38+00:00","og_image":[{"width":1575,"height":1125,"url":"https:\/\/www.mcafee.com\/blogs\/wp-content\/uploads\/2019\/04\/Global-Cyber-security-concept-copy.jpg","type":"image\/jpeg"}],"author":"Hardik Shah, Charles McFarland, Thomas Roccia","twitter_card":"summary_large_image","twitter_creator":"@hardik05","twitter_site":"@McAfee","twitter_misc":{"Written by":"Hardik Shah, Charles McFarland, Thomas Roccia","Est. reading time":"7 minutes"},"schema":{"@context":"https:\/\/schema.org","@graph":[{"@type":"Article","@id":"https:\/\/www.mcafee.com\/blogs\/other-blogs\/mcafee-labs\/jet-database-engine-flaw-may-lead-to-exploitation-analyzing-cve-2018-8423\/#article","isPartOf":{"@id":"https:\/\/www.mcafee.com\/blogs\/other-blogs\/mcafee-labs\/jet-database-engine-flaw-may-lead-to-exploitation-analyzing-cve-2018-8423\/"},"author":{"name":"Hardik Shah","@id":"https:\/\/www.mcafee.com\/blogs\/#\/schema\/person\/99cb905e9b4051dfea96a7752dea4342"},"headline":"Jet Database Engine Flaw May Lead to Exploitation: Analyzing CVE-2018-8423","datePublished":"2019-07-30T15:53:30+00:00","dateModified":"2024-02-19T03:05:38+00:00","mainEntityOfPage":{"@id":"https:\/\/www.mcafee.com\/blogs\/other-blogs\/mcafee-labs\/jet-database-engine-flaw-may-lead-to-exploitation-analyzing-cve-2018-8423\/"},"wordCount":1399,"publisher":{"@id":"https:\/\/www.mcafee.com\/blogs\/#organization"},"image":{"@id":"https:\/\/www.mcafee.com\/blogs\/other-blogs\/mcafee-labs\/jet-database-engine-flaw-may-lead-to-exploitation-analyzing-cve-2018-8423\/#primaryimage"},"thumbnailUrl":"https:\/\/www.mcafee.com\/blogs\/wp-content\/uploads\/2019\/04\/Global-Cyber-security-concept-copy.jpg","keywords":["Advanced Threat Research"],"articleSection":["McAfee Labs"],"inLanguage":"en-US"},{"@type":"WebPage","@id":"https:\/\/www.mcafee.com\/blogs\/other-blogs\/mcafee-labs\/jet-database-engine-flaw-may-lead-to-exploitation-analyzing-cve-2018-8423\/","url":"https:\/\/www.mcafee.com\/blogs\/other-blogs\/mcafee-labs\/jet-database-engine-flaw-may-lead-to-exploitation-analyzing-cve-2018-8423\/","name":"Jet Database Engine Flaw May Lead to Exploitation: Analyzing CVE-2018-8423 | McAfee Blog","isPartOf":{"@id":"https:\/\/www.mcafee.com\/blogs\/#website"},"primaryImageOfPage":{"@id":"https:\/\/www.mcafee.com\/blogs\/other-blogs\/mcafee-labs\/jet-database-engine-flaw-may-lead-to-exploitation-analyzing-cve-2018-8423\/#primaryimage"},"image":{"@id":"https:\/\/www.mcafee.com\/blogs\/other-blogs\/mcafee-labs\/jet-database-engine-flaw-may-lead-to-exploitation-analyzing-cve-2018-8423\/#primaryimage"},"thumbnailUrl":"https:\/\/www.mcafee.com\/blogs\/wp-content\/uploads\/2019\/04\/Global-Cyber-security-concept-copy.jpg","datePublished":"2019-07-30T15:53:30+00:00","dateModified":"2024-02-19T03:05:38+00:00","description":"In September 2018, the Zero Day Initiative published a proof of concept for a vulnerability in Microsoft\u2019s Jet Database Engine. Microsoft released a patch","breadcrumb":{"@id":"https:\/\/www.mcafee.com\/blogs\/other-blogs\/mcafee-labs\/jet-database-engine-flaw-may-lead-to-exploitation-analyzing-cve-2018-8423\/#breadcrumb"},"inLanguage":"en-US","potentialAction":[{"@type":"ReadAction","target":["https:\/\/www.mcafee.com\/blogs\/other-blogs\/mcafee-labs\/jet-database-engine-flaw-may-lead-to-exploitation-analyzing-cve-2018-8423\/"]}]},{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/www.mcafee.com\/blogs\/other-blogs\/mcafee-labs\/jet-database-engine-flaw-may-lead-to-exploitation-analyzing-cve-2018-8423\/#primaryimage","url":"https:\/\/www.mcafee.com\/blogs\/wp-content\/uploads\/2019\/04\/Global-Cyber-security-concept-copy.jpg","contentUrl":"https:\/\/www.mcafee.com\/blogs\/wp-content\/uploads\/2019\/04\/Global-Cyber-security-concept-copy.jpg","width":1575,"height":1125},{"@type":"BreadcrumbList","@id":"https:\/\/www.mcafee.com\/blogs\/other-blogs\/mcafee-labs\/jet-database-engine-flaw-may-lead-to-exploitation-analyzing-cve-2018-8423\/#breadcrumb","itemListElement":[{"@type":"ListItem","position":1,"name":"Blog","item":"https:\/\/www.mcafee.com\/blogs\/"},{"@type":"ListItem","position":2,"name":"Other Blogs","item":"https:\/\/www.mcafee.com\/blogs\/other-blogs\/"},{"@type":"ListItem","position":3,"name":"McAfee Labs","item":"https:\/\/www.mcafee.com\/blogs\/other-blogs\/mcafee-labs\/"},{"@type":"ListItem","position":4,"name":"Jet Database Engine Flaw May Lead to Exploitation: Analyzing CVE-2018-8423"}]},{"@type":"WebSite","@id":"https:\/\/www.mcafee.com\/blogs\/#website","url":"https:\/\/www.mcafee.com\/blogs\/","name":"McAfee Blog","description":"Internet Security News","publisher":{"@id":"https:\/\/www.mcafee.com\/blogs\/#organization"},"potentialAction":[{"@type":"SearchAction","target":{"@type":"EntryPoint","urlTemplate":"https:\/\/www.mcafee.com\/blogs\/?s={search_term_string}"},"query-input":{"@type":"PropertyValueSpecification","valueRequired":true,"valueName":"search_term_string"}}],"inLanguage":"en-US"},{"@type":"Organization","@id":"https:\/\/www.mcafee.com\/blogs\/#organization","name":"McAfee","url":"https:\/\/www.mcafee.com\/blogs\/","logo":{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/www.mcafee.com\/blogs\/#\/schema\/logo\/image\/","url":"https:\/\/www.mcafee.com\/blogs\/wp-content\/uploads\/2023\/02\/mcafee-logo.png","contentUrl":"https:\/\/www.mcafee.com\/blogs\/wp-content\/uploads\/2023\/02\/mcafee-logo.png","width":1286,"height":336,"caption":"McAfee"},"image":{"@id":"https:\/\/www.mcafee.com\/blogs\/#\/schema\/logo\/image\/"},"sameAs":["https:\/\/www.facebook.com\/McAfee\/","https:\/\/x.com\/McAfee","https:\/\/www.linkedin.com\/company\/mcafee\/","https:\/\/www.youtube.com\/McAfee"]},{"@type":"Person","@id":"https:\/\/www.mcafee.com\/blogs\/#\/schema\/person\/99cb905e9b4051dfea96a7752dea4342","name":"Hardik Shah","image":{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/www.mcafee.com\/blogs\/#\/schema\/person\/image\/b151596c8b1a8dc9b25ec3b19ccfd8c0","url":"https:\/\/secure.gravatar.com\/avatar\/2b87a13b8b83a589e5494d7db597ad6a?s=96&d=mm&r=g","contentUrl":"https:\/\/secure.gravatar.com\/avatar\/2b87a13b8b83a589e5494d7db597ad6a?s=96&d=mm&r=g","caption":"Hardik Shah"},"description":"Hardik Shah, a Senior Research Engineer in McAfee Labs, is an experienced security researcher and technology evangelist. He has extensive experience with exploits, malware analysis, and various IPS engines. Shah enjoys figuring out ways to protect customers from the latest threats. Prior to McAfee, he worked with the IPS research team at Symantec. You can follow him on twitter at @hardik05","sameAs":["https:\/\/www.linkedin.com\/in\/hardik05\/","https:\/\/x.com\/hardik05"],"url":"https:\/\/www.mcafee.com\/blogs\/author\/hardik-shah\/"}]}},"_links":{"self":[{"href":"https:\/\/www.mcafee.com\/blogs\/wp-json\/wp\/v2\/posts\/96131","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/www.mcafee.com\/blogs\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/www.mcafee.com\/blogs\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/www.mcafee.com\/blogs\/wp-json\/wp\/v2\/users\/612"}],"replies":[{"embeddable":true,"href":"https:\/\/www.mcafee.com\/blogs\/wp-json\/wp\/v2\/comments?post=96131"}],"version-history":[{"count":1,"href":"https:\/\/www.mcafee.com\/blogs\/wp-json\/wp\/v2\/posts\/96131\/revisions"}],"predecessor-version":[{"id":182949,"href":"https:\/\/www.mcafee.com\/blogs\/wp-json\/wp\/v2\/posts\/96131\/revisions\/182949"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/www.mcafee.com\/blogs\/wp-json\/wp\/v2\/media\/95077"}],"wp:attachment":[{"href":"https:\/\/www.mcafee.com\/blogs\/wp-json\/wp\/v2\/media?parent=96131"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/www.mcafee.com\/blogs\/wp-json\/wp\/v2\/categories?post=96131"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/www.mcafee.com\/blogs\/wp-json\/wp\/v2\/tags?post=96131"},{"taxonomy":"author","embeddable":true,"href":"https:\/\/www.mcafee.com\/blogs\/wp-json\/wp\/v2\/coauthors?post=96131"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}