08-13-2024 04:03 PM
08-13-2024 11:35 PM
Hello @derrtavdam
I've been in a similar situation where security flagged a critical vulnerability that required us to update our Nexus switches to a non-preferred release. While it's understandable to be cautious, especially with devices handling critical datacenter operations, I've found that Cisco's recommended releases usually undergo extensive testing, even if they're not marked as preferred.
Regarding 10.5(1), we did run into a few minor bugs after the upgrade, but they were manageable and didn't impact our operations. The key was to thoroughly test the update in a lab environment before rolling it out to production. Also, if you haven't already, it might be worth checking Cisco's bug tracker for any issues specific to 10.5(1) that could affect your setup.
In short, while it's not without risks, if this update is the only way to mitigate CVE-2024-6387, it might be worth considering, especially with proper testing and a rollback plan in place.
At least it worked great for us (no outage LOOOL) hope it goes smoothly for you too!
E.S
08-13-2024 11:45 PM
>....we did run into a few minor bugs after the upgrade,
- Could you also explain and or elaborate on these minor bugs which you found ?
M.
Discover and save your favorite ideas. Come back to expert answers, step-by-step guides, recent topics, and more.
New here? Get started with these tips. How to use Community New member guide