There are no workarounds that address these vulnerabilities.
If the Remote Management feature is enabled, Cisco recommends disabling it to reduce exposure to these vulnerabilities. The feature is disabled by default.
To determine the setting of the Remote Management feature, choose Firewall > General and review the status of the Remote Management check box. If Remote Management is enabled, uncheck the check box. This will disable the web-based management interface on the WAN IP address, which is reachable through the WAN ports to the internet. The web-based management interface will continue to be available on the LAN IP address, which is reachable through the LAN ports.
While this mitigation has been deployed and was proven successful in a test environment, customers should determine the applicability and effectiveness in their own environment and under their own use conditions. Customers should be aware that any workaround or mitigation that is implemented may negatively impact the functionality or performance of their network based on intrinsic customer deployment scenarios and limitations. Customers should not deploy any workarounds or mitigations before first evaluating the applicability to their own environment and any impact to such environment.