Vulnerability Recommended Actions
If the previous table lists a version in the Versions known to be not vulnerable column, you can eliminate this vulnerability by upgrading to the listed version. If the listed version is older than the version you are currently running, or if the table does not list any version in the column, then no upgrade candidate currently exists.
To mitigate these vulnerabilities for BIG-IP and Enterprise Manager systems, you can restrict access to the Configuration utility to only trusted networks, and limit login access to trusted users.
F5 would like to acknowledge Oliver Gruskovnjak of Portcullis, Inc. for bringing this issue to our attention, and for following the highest standards of responsible disclosure.