Administrators are advised to apply the appropriate updates.
Administrators are advised to allow only trusted users to have network access.
Administrators may consider using IP-based access control lists (ACLs) to allow only trusted systems to access the affected systems.
For additional information about cross-site request forgery attacks and potential methods of mitigation, see the Cisco Applied Mitigation Bulletin Understanding Cross-Site Request Forgery Threat Vectors["http://tools.cisco.com/security/center/viewAMBAlert.x?alertId=28726"]
Administrators are advised to monitor affected systems.