How-To: Addressing Security Vulnerabilities on Cisco Switches in Engineered Systems
(Doc ID 2232764.1)
Last updated on JULY 02, 2018
Applies to:Exadata X4-8 Hardware - Version All Versions and later
Exalogic Elastic Cloud X6-2 Hardware - Version X6 to X6 [Release X6]
Exalogic Elastic Cloud X5-2 Hardware - Version X5 to X5 [Release X5]
Exalogic Elastic Cloud X4-2 Hardware - Version X4 to X4 [Release X4]
Exalogic Elastic Cloud X3-2 Hardware - Version X3 to X3 [Release X3]
Information in this document applies to any platform.
Engineered systems such as SuperCluster, Exadata and Exalogic contain a Cisco Ethernet switch (model 4948, 4948E or Nexus 93108TC-EX depending on the model of engineered system). Security scans may identify vulnerabilities associated with this switch, some of which require an update to the IOS software. This document provides information on determining if identified vulnerabilities affect the installed switch and if so, how to resolve them.
To view full details, sign in with your My Oracle Support account.
Don't have a My Oracle Support account? Click to get started!
In this Document