My Oracle Support Banner

How-To: Addressing Security Vulnerabilities on Cisco Switches in Engineered Systems (Doc ID 2232764.1)

Last updated on JULY 02, 2018

Applies to:

Exadata X4-8 Hardware - Version All Versions and later
Exalogic Elastic Cloud X6-2 Hardware - Version X6 to X6 [Release X6]
Exalogic Elastic Cloud X5-2 Hardware - Version X5 to X5 [Release X5]
Exalogic Elastic Cloud X4-2 Hardware - Version X4 to X4 [Release X4]
Exalogic Elastic Cloud X3-2 Hardware - Version X3 to X3 [Release X3]
Information in this document applies to any platform.

Goal

Engineered systems such as SuperCluster, Exadata and Exalogic contain a Cisco Ethernet switch (model 4948, 4948E or Nexus 93108TC-EX depending on the model of engineered system). Security scans may identify vulnerabilities associated with this switch, some of which require an update to the IOS software. This document provides information on determining if identified vulnerabilities affect the installed switch and if so, how to resolve them.

  

Because the Ethernet switches included in engineered systems are not manufactured by Oracle, support for them is limited to hardware only.  Oracle has no control over the development of software used on the Cisco switches, to include tracking and patching bugs. Therefore, Oracle cannot provide direct downloads of Cisco’s software.

  

Solution

To view full details, sign in with your My Oracle Support account.

Don't have a My Oracle Support account? Click to get started!


In this Document
Goal
Solution
References


My Oracle Support provides customers with access to over a million knowledge articles and a vibrant support community of peers and Oracle experts.