Administrators are advised to contact the vendor regarding future updates and releases.
Administrators are advised to enable XML Execution authentication in the configuration settings of affected devices.
Administrators are advised to allow only trusted users to have network access.
Administrators can help protect affected systems from external attacks by using a solid firewall strategy.
Administrators may consider using IP-based access control lists (ACLs) to allow only trusted systems to access the affected systems.
Administrators are advised to monitor affected systems.