Vulnerability Recommended Actions
If you are running a version listed in the Versions known to be vulnerable column, you can eliminate this vulnerability by upgrading to a version listed in the Versions known to be not vulnerable column. If the table lists only an older version than what you are currently running, or does not list a non-vulnerable version, then no upgrade candidate currently exists.
BIG-IP, BIG-IQ, and Enterprise Manager
To mitigate this vulnerability, do not configure NTP to accept symmetric key encryption.
If you choose to use symmetric keys to authenticate time packets in an untrusted environment where ephemeral time servers can be created, or if it is expected that malicious time servers will participate in an NTP broadcast domain, limit the number of systems that participate in the shared-key group.