There are no workarounds that address this vulnerability. However, administrators may reduce the scope of this vulnerability by preventing nonadministrative users from executing CEE ConfD CLI commands. Using administrative credentials, enter the following commands:
config
nacm cmd-exec-default deny nacm rule-list admin group [ admin ] cmdrule cmd-any-access action permit exit exit commit
While this mitigation has been deployed and was proven successful in a test environment, customers should determine the applicability and effectiveness in their own environment and under their own use conditions. Customers should be aware that any workaround or mitigation that is implemented may negatively impact the functionality or performance of their network based on intrinsic customer deployment scenarios and limitations. Customers should not deploy any workarounds or mitigations before first evaluating the applicability to their own environment and any impact to such environment.