Vulnerability Recommended Actions
If you are running a version listed in the Versions known to be vulnerablecolumn, you can eliminate this vulnerability by upgrading to a version listed in the Versions known to be not vulnerablecolumn. If the table lists only an older version than what you are currently running, or does not list a non-vulnerable version, then no upgrade candidate currently exists.
BIG-IP, BIG-IQ, and Enterprise Manager
To mitigate this vulnerability, ensure that any custom BIG-IP monitors or custom configurations relying on OpenSSL command line utilities which depend on the function specified in this vulnerability, are only interacting with trusted systems in your environment.
Supplemental Information