To prevent exploitability of this vulnerability, administrators can apply access-control lists (ACLs) that deny ICMP unreachable packets to an affected device.
Customers that do not use any IPsec features can also disable the IPsec processes as shown in the following example:
RP/0/RP0/CPU0:ios#process shutdown ipsec_mp
Fri Feb 21 14:56:03.870 UTC
Process Shutdown of a process could leave the System in an Inconsistent State. Proceed? [confirm]
RP/0/RP0/CPU0:ios#process shutdown ipsec_pp
Fri Feb 21 14:56:09.124 UTC
Process Shutdown of a process could leave the System in an Inconsistent State. Proceed? [confirm]
RP/0/RP0/CPU0:ios#
Note: Shutting down the IPsec processes is not persistent across reloads and would need to be re-applied after every system reload.