Known vulnerabilities in IBM Corporation Flex System FC3171 8Gb SAN Switch

CSH
CYBERSECURITY HELP
Vulnerability Intelligence Vulnerability Management Pricing Vulnerability Database Blog
Sign In REGISTER
Vulnerability Intelligence Vulnerability Management Pricing Vulnerability Database Blog
Sign In REGISTER
[] 
Main › Vulnerability Database › IBM Corporation › Flex System FC3171 8Gb SAN Switch

Known vulnerabilities in IBM Corporation Flex System FC3171 8Gb SAN Switch

Vendor: IBM Corporation
Website: https://www.ibm.com/us-en
Total Security Bulletins: 5
9.1.14.02.00 9.1.15.01.00 9.1.9.02.00 9.1.8.01.00

Security bulletins (5)

Secuity bulletin Severity Status Published
SB2025021233: Multiple vulnerabilities in IBM Flex System FC3171 8Gb SAN Switch & SAN Pass-thru Low
Patched
12.02.2025
SB2023051126: Multiple vulnerabilities in IBM Flex System FC3171 8Gb SAN Switch and SAN Pass-thru Firmware, QLogic 8Gb Intelligent Pass-thru Module & SAN Switch Module and QLogic Virtual Fabric Extension Module for IBM BladeCenter Medium
Patched
11.05.2023
SB2018042483: Multiple vulnerabilities in QLogic 8Gb Intelligent Pass-thru Module and SAN Switch Module for IBM BladeCenter and IBM Flex System FC3171 8Gb SAN Switch & SAN Pass-thru High
Patched Public exploit
24.04.2018
SB2017050824: Multiple vulnerabilities in IBM Flex System FC3171 8Gb SAN Switch and SAN Pass-thru and QLogic Virtual Fabric Extension Module for IBM BladeCenter High
Patched
08.05.2017
SB2016100612: Multiple vulnerabilities in IBM Flex System FC3171 8Gb SAN Switch and SAN Pass-thru Firmware and QLogic Virtual Fabric Extension Module for IBM BladeCenter High
Patched
06.10.2016


Terms of Use|Privacy Policy|Contacts

© 2026 Cybersecurity Help s.r.o.


Cookie Settings

We use cookies to enhance your browsing experience, serve personalized content, and analyze our traffic.

Necessary

Required for basic site functionality

Google Analytics

Helps us understand how visitors use our site

Learn more in our Privacy Policy

Please verify you're human

Complete the CAPTCHA below or accept cookies to continue browsing.

or