There are no workarounds that address this vulnerability.
Customers who cannot immediately apply a software fix may evaluate the possibility of disabling Secure Login Enhancements by removing the login parameters from the configuration until a software fix can be applied, and relying on an access control list (ACL) on the management interface (mgmt0) to restrict access to the device only from explicitly trusted source IP addresses.
Customers should first evaluate the impact of those configuration changes to the device and their security policy. Customers concerned about undesired or unexpected side effects should consult with their support organization before implementing any configuration change.