Administrators are advised to apply the appropriate updates.
Users are advised not to open e-mail messages from suspicious or unrecognized sources. If users cannot verify that links or attachments included in e-mail messages are safe, they are advised not to open them.
Administrators are advised to monitor affected systems.
Administrators running the affected software on Microsoft Windows platforms may consider blacklisting the vulnerable ActiveX control class identifiers (CLSIDs) by setting a kill bit. Microsoft has released a security advisory for additional details on performing this action at the following link: ActiveX Kill Bits 2736233
The Cisco Applied Intelligence team has created the following companion document to guide administrators in identifying and mitigating attempts to exploit this vulnerability prior to applying updated software: cisco-amb-20120620-ac