CVE-2014-3566 - Instructions to Mitigate and Resolve the SSL v3.0 Vulnerability (aka "Poodle Attack") in Oracle Real-Time Scheduler and Oracle Mobile Workforce Management
(Doc ID 1983978.1)
Last updated on JUNE 28, 2021
Applies to:
Oracle Real-Time SchedulerOracle Utilities Mobile Workforce Management
Information in this document applies to any platform.
Purpose
This document provides instructions to resolve the SSL v3.0 security vulnerability referenced in CVE-2014-3566.
Scope
Components in Oracle Real-Time Scheduler and Oracle Mobile Workforce Management can use SSL v3.0.
Oracle Real-Time Scheduler and Oracle Mobile Workforce Management uses SSL in two main ways:
1.Application Server (Weblogic): to secure browser connections to Oracle Real-Time Scheduler (Or Oracle Mobile Workforce Management) as an application
2.Mobile Devices (MCP): to secure device connections to the Mobility Application Server
Details
To view full details, sign in with your My Oracle Support account. |
|
Don't have a My Oracle Support account? Click to get started! |
In this Document
Purpose |
Scope |
Details |
References |