There are no workarounds that address this vulnerability.
However, customers who do not use the Cisco Discovery Protocol feature can disable it either globally to fully close the attack vector or on individual interfaces to reduce the attack surface.
Disable Cisco Discovery Protocol Globally
To disable Cisco Discovery Protocol globally on devices that are running Cisco IOS XR Software, use the no cdp command in global configuration mode, as shown in the following example:
RP/0/RP0/CPU0:iosxr#conf t
Mon Sep 23 17:58:08.556 UTC RP/0/RP0/CPU0:iosxr(config)#no cdp RP/0/RP0/CPU0:iosxr(config)#exit
Uncommitted changes found, commit them before exiting(yes/no/cancel)? [cancel]:yes
Disable Cisco Discovery Protocol on an Interface
To disable Cisco Discovery Protocol on an interface on devices that are running Cisco IOS XR Software, use the no cdp command in interface configuration mode, as shown in the following example:
RP/0/RP0/CPU0:iosxr#conf t
Mon Sep 23 18:00:08.622 UTC RP/0/RP0/CPU0:iosxr(config)#interface GigabitEthernet0/0/0/0 RP/0/RP0/CPU0:iosxr(config-if)#no cdp RP/0/RP0/CPU0:iosxr(config-if)#end Uncommitted changes found, commit them before exiting(yes/no/cancel)? [cancel]:yes
While this mitigation has been deployed and was proven successful in a test environment, customers should determine the applicability and effectiveness in their own environment and under their own use conditions. Customers should be aware that any workaround or mitigation that is implemented may negatively impact the functionality or performance of their network based on intrinsic customer deployment scenarios and limitations. Customers should not deploy any workarounds or mitigations before first evaluating the applicability to their own environment and any impact to such environment.