There are no workarounds that address this vulnerability; however, there are mitigation options.
Option 1
Disable SIP if not required: Disabling SIP will completely close the attack vector for this vulnerability. However, it may not be suitable for all customers because it is a required feature in many environments.
To disable SIP from the web admin UI, navigate to Configuration > Protocols > SIP, and under the Configuration section, set SIP mode to Off and click Save.
Option 2
Disable Provisioning services if not required: Disabling Provisioning services will completely close the attack vector for this vulnerability. However, it may not be suitable for all customers because it is a required feature in many environments.
To disable Provisioning services from the web admin UI, the steps depend on the software version in use:
For releases X8.11 and later, navigate to System > Administration settings, and under the Services section, set Provisioning services to Off and click Save.
For releases prior to X8.11, disable the Phone Book server by removing all Provisioning (P) or Starter Pack (S) option keys.