Administrators are advised to contact the vendor regarding future updates and releases.
Administrators are advised to allow only trusted users to have network access.
Administrators may consider using IP-based access control lists (ACLs) to allow only trusted systems to access the affected systems.
Administrators are advised to monitor affected systems.
Understanding activity on the network provides information and visibility that can be used to identify potential security incidents. Organizations should log events from devices and review the logged data to provide insight into anomalies or malicious activity. For logging best practices, see Cisco Guide to Harden Cisco IOS Devices
Administrators are advised to monitor network traffic for security-related network activity. NetFlow identifies such activity. For NetFlow configuration details, see Introduction to Cisco IOS NetFlow - A Technical Overview
It is critical to prevent unauthorized direct communication to network devices. Restrict network traffic destined for the network infrastructure to protect against reconnaissance and denial of service attacks. For configuration details, see Protecting Your Core: Infrastructure Protection Access Control Lists