Administrators are advised to apply the available software updates.
Administrators may consider using IP-based access control lists (ACLs) to allow only trusted systems to access the web-based management interface on affected systems.
Administrators are advised to monitor critical systems.
The Cisco Applied Intelligence team has created the following companion document to guide administrators in identifying and mitigating attempts to exploit this vulnerability prior to applying updated software: cisco-amb-20110330-acs["http://www.cisco.com/en/US/products/products_applied_mitigation_bulletin09186a0080b7411a.html"]