CVE-2014-3566 - Instructions to Mitigate and Resolve the SSL v3.0 Vulnerability (aka "Poodle Attack") in Oracle Real-Time Scheduler and Oracle Mobile Workforce Management
(Doc ID 1983978.1)
Last updated on AUGUST 31, 2020
Applies to:Oracle Real-Time Scheduler
Oracle Utilities Mobile Workforce Management
Information in this document applies to any platform.
This document provides instructions to resolve the SSL v3.0 security vulnerability referenced in CVE-2014-3566.
Components in Oracle Real-Time Scheduler and Oracle Mobile Workforce Management can use SSL v3.0.
Oracle Real-Time Scheduler and Oracle Mobile Workforce Management uses SSL in two main ways:
1.Application Server (Weblogic): to secure browser connections to Oracle Real-Time Scheduler (Or Oracle Mobile Workforce Management) as an application
2.Mobile Devices (MCP): to secure device connections to the Mobility Application Server
To view full details, sign in with your My Oracle Support account.
Don't have a My Oracle Support account? Click to get started!
In this Document