How-To: Addressing Security Vulnerabilities on Cisco Switches in Engineered Systems (Doc ID 2232764.1)

Last updated on JUNE 21, 2017

Applies to:

Exadata X6-8 Hardware - Version All Versions and later
Exadata X4-8 Hardware - Version All Versions and later
Exadata X5-2 Hardware - Version All Versions and later
Oracle SuperCluster T5-8 Hardware - Version All Versions and later
Oracle SuperCluster M7 Hardware - Version All Versions and later
Information in this document applies to any platform.

Goal

Engineered systems such as SuperCluster and Exadata contain a Cisco Ethernet switch (model 4948 or 4948E depending on the model of engineered system). Security scans may identify vulnerabilities associated with this switch, some of which require an update to the IOS software. This document provides information on determining if identified vulnerabilities affect the installed switch and if so, how to resolve them.

  

Because the Ethernet switches included in Exadata systems are not manufactured by Oracle, support for them is limited to hardware only.  Oracle has no control over the development of software used on the Cisco switches, to include tracking and patching bugs. Therefore, Oracle cannot provide direct downloads of Cisco’s software.

  

Solution

Sign In with your My Oracle Support account

Don't have a My Oracle Support account? Click to get started

My Oracle Support provides customers with access to over a
Million Knowledge Articles and hundreds of Community platforms