There are no workarounds that address this vulnerability.
However, customers who do not use the Cisco Discovery Protocol feature can disable it either globally to fully close the attack vector or on individual interfaces to reduce the attack surface.
Disable Cisco Discovery Protocol Globally
To disable Cisco Discovery Protocol globally on devices that are running Cisco IOS XR Software, administrators can use the no cdp command in global configuration mode, as shown in the following example:
RP/0/RP0/CPU0:ios#conf t
Mon Dec 2 17:58:08.556 UTC RP/0/RP0/CPU0:ios(config)#no cdp RP/0/RP0/CPU0:ios(config)#exit
Uncommitted changes found, commit them before exiting(yes/no/cancel)? [cancel]:yes
Disable Cisco Discovery Protocol on an Interface
To disable Cisco Discovery Protocol on an interface on devices that are running Cisco IOS XR Software, administrators can use the no cdp command in interface configuration mode, as shown in the following example:
RP/0/RP0/CPU0:ios#conf t
Mon Dec 2 18:00:08.622 UTC RP/0/RP0/CPU0:ios(config)#interface GigabitEthernet0/0/0/0 RP/0/RP0/CPU0:ios(config-if)#no cdp RP/0/RP0/CPU0:ios(config-if)#end Uncommitted changes found, commit them before exiting(yes/no/cancel)? [cancel]:yes