My Oracle Support Banner

CVE-2014-3566 - Instructions to Mitigate and Resolve the SSL v3.0 Vulnerability (aka "Poodle Attack") in Oracle Real-Time Scheduler and Oracle Mobile Workforce Management (Doc ID 1983978.1)

Last updated on MAY 08, 2018

Applies to:

Oracle Real-Time Scheduler
Oracle Utilities Mobile Workforce Management
Information in this document applies to any platform.

Purpose

 This document provides instructions to resolve the SSL v3.0 security vulnerability referenced in CVE-2014-3566.

Scope

Components in Oracle Real-Time Scheduler and Oracle Mobile Workforce Management can use SSL v3.0.

Oracle Real-Time Scheduler and Oracle Mobile Workforce Management uses SSL in two main ways:

1.Application Server (Weblogic): to secure browser connections to Oracle Real-Time Scheduler (Or Oracle Mobile Workforce Management) as an application

2.Mobile Devices (MCP): to secure device connections to the Mobility Application Server

Details

To view full details, sign in with your My Oracle Support account.

Don't have a My Oracle Support account? Click to get started!


In this Document
Purpose
Scope
Details
References

My Oracle Support provides customers with access to over a million knowledge articles and a vibrant support community of peers and Oracle experts.