Administrators are advised to apply the appropriate updates.
Administrators may consider using IP-based access control lists (ACLs) to allow only trusted systems to access the affected systems.
Administrators are advised to allow only privileged users to access administration or management systems.
It is critical to prevent unauthorized direct communication to network devices. Restrict network traffic destined for the network infrastructure to protect against reconnaissance and DoS attacks. For configuration details, consult Protecting Your Core: Infrastructure Protection Access Control Lists
Administrators may consider using the HTTPS management interface instead of the SSH management access.
Administrators are advised to monitor affected systems.