There is no configuration workaround to eliminate the problem. However,
if you are unable to upgrade to an unaffected version, you may use other
devices to strictly control or prohibit telnet access to the switch, permitting
only connections from your local network.
Access control lists on the switch can limit the remote exploitation of
the vulnerability. To limit access to known hosts use the following commands:
set ip permit enable
set ip permit <addr>
Remote management of the switch can also be disabled.
The above workarounds are provided as an option; however, the
recommendation is to upgrade to fixed code as soon as possible.