Vulnerability Recommended Actions
If you are running a version listed in the Versions known to be vulnerable column, you can eliminate this vulnerability by upgrading to a version listed in theVersions known to be not vulnerable column. If the table lists only an older version than what you are currently running, or does not list a non-vulnerable version, then no upgrade candidate currently exists.
To mitigate this vulnerability for BIG-IP systems, you can avoid using SSH/SFTP in thecURL utility, through a custom EAV monitor, through a script, or interactively with the**cURL **utility.
Impact of action: Ensure any changes to your configuration are compatible with your environment.
Supplemental Information