Administrators are advised to apply the appropriate updates.
It is critical to prevent unauthorized direct communication to network devices. Restrict network traffic destined for the network infrastructure to protect against reconnaissance and denial of service attacks. For configuration details, see Protecting Your Core: Infrastructure Protection Access Control Lists
Administrators are advised to monitor network traffic for security-related network activity. Cisco NetFlow can identify such activity. For more information about Cisco NetFlow, see Introduction to Cisco IOS NetFlow - A Technical Overview
Administrators may consider disabling the NAT ALG for multipart SDP in SIP on affected devices by issuing the no ip nat service allow-multipart
command in global configuration mode; however, this workaround may negatively impact the interoperability with third party SIP gateways and devices.
Administrators are advised to monitor affected systems.