How-To: Addressing Security Vulnerabilities on Cisco Switches in Engineered Systems
(Doc ID 2232764.1)
Last updated on MARCH 20, 2020
Applies to:Exalogic Elastic Cloud X4-2 Hardware - Version X4 to X4 [Release X4]
Exalogic Elastic Cloud X3-2 Hardware - Version X3 to X3 [Release X3]
Exadata X5-2 Hardware - Version All Versions and later
Oracle SuperCluster T5-8 Hardware - Version All Versions and later
Oracle SuperCluster M7 Hardware - Version All Versions and later
Information in this document applies to any platform.
Engineered systems such as SuperCluster, Exadata and Exalogic contain a Cisco Ethernet switch (model 4948, 4948E, Nexus 93108TC-EX, etc depending on the model of engineered system). Security scans may identify vulnerabilities associated with this switch, some of which require an update to the IOS software. This document provides information on determining if identified vulnerabilities affect the installed switch and if so, how to resolve them.
To view full details, sign in with your My Oracle Support account.
Don't have a My Oracle Support account? Click to get started!
In this Document