How-To: Addressing Security Vulnerabilities on Cisco Switches in Engineered Systems
(Doc ID 2232764.1)
Last updated on APRIL 12, 2022
Applies to:Exalogic Elastic Cloud X4-2 Hardware - Version X4 to X4 [Release X4]
Exalogic Elastic Cloud X3-2 Hardware - Version X3 to X3 [Release X3]
Exadata X5-2 Hardware - Version All Versions and later
Oracle SuperCluster T5-8 Hardware - Version All Versions and later
Oracle SuperCluster M7 Hardware - Version All Versions and later
Information in this document applies to any platform.
Engineered systems such as SuperCluster, Exadata and Exalogic contain a Cisco Ethernet switch (model 4948, 4948E, Nexus 93108TC-EX, etc depending on the model of engineered system). Security scans may identify vulnerabilities associated with this switch, some of which require an update to the IOS software. This document provides information on determining if identified vulnerabilities affect the installed switch and if so, how to resolve them.
Because the Ethernet switches included in engineered systems are not manufactured by Oracle, direct support for them is limited to hardware only. Oracle has no control over the development of software used on the Cisco switches, to include tracking and patching bugs. While we can assist in determining if a CVE affects the Cisco switch in your engineered system (one goal of this document), Oracle cannot provide direct downloads of Cisco’s software or assist you with installation of the updated software.
To view full details, sign in with your My Oracle Support account.
Don't have a My Oracle Support account? Click to get started!
In this Document