Cisco has resolved a set of critical vulnerabilities in Policy Suite which permit attackers to cause havoc in the software's databases.

This week, the tech giant released a security advisory detailing four vulnerabilities which could place enterprise users at risk of information leaks, account compromise, database tampering, and more.

The first vulnerability, CVE-2018-0374[1], has earned a CVSS base score of 9.8. Described as an unauthenticated bypass bug, the security flaw "could allow an unauthenticated, remote attacker to connect directly to the Policy Builder database," according to Cisco.

The bug has been caused by a simple lack of authentication and as there is no requirement for identity verification, Policy Builder databases can be accessed and tampering with without limitation.

Cisco Policy Suite releases prior to 18.2.0 are affected.

See also: Thousands of US voters' data exposed by robocall firm[2]

The second vulnerability, CVE-2018-0375[3], is a default password error. The CVSS 9.8 bug is present in the Cluster Manager of Cisco Policy Suite and could allow an unauthenticated, remote attacker to log in to a vulnerable system using a root account.

The serious security problem has emerged due to the use of undocumented, static user credentials for root accounts. If a hacker has knowledge of these credentials, they can become a root user and are able to execute arbitrary commands.

Versions of the software prior to 18.2.0 are vulnerable to exploit.

The third bug, CVE-2018-0376[4], is another unauthenticated access problem and is also caused by a lack of authentication measures.

"A successful exploit could allow the attacker to make changes to existing repositories and create new repositories," Cisco says.

TechRepublic: Cisco: 32 percent of businesses are 'highly

Read more from our friends at ZDNet