There are no workarounds to address this vulnerability.
However, administrators can disable the Cisco IMC web-management interface to mitigate the impact of these vulnerabilities. For example, the following commands show how to perform the configuration change on a UCS C-Series Server:
xxxxxx-bmc# scope http
xxxxxx-bmc /http # xxxxxx-bmc /http # set enabled no SSH is in enabled state. Disabling HTTP service Warning: setting "enabled" to "no" will disconnect all existing http connections and will disable login via WebUI. xxxxxx-bmc /http *# commit xxxxxx-bmc /http # show detail HTTP Settings: HTTP Port: 80 HTTPS Port: 443 Timeout: 1800 Max Sessions: 4 Active Sessions: 0 Enabled: no HTTP Redirected: yes xxxxxx-bmc /http # exit