** While BIG-IP v12.0.0 ships with an OpenSSL version prior to 1.0.1n, the libraries necessary to fix the issue were merged with the BIG-IP system's OpenSSL implementation.
*** For LineRate systems, the vulnerable code exists on the system; however, it is not used in the way that exposes the system to the vulnerability.
Vulnerability Recommended Actions
If the previous table lists a version in the Versions known to be not vulnerable column, you can eliminate this vulnerability by upgrading to the listed version. If the listed version is older than the version you are currently running, or if the table does not list any version in the column, then no upgrade candidate currently exists.
To mitigate this vulnerability for BIG-IP, Enterprise Manager, and BIG-IQ, you should permit management access to F5 products only over a secure network and restrict command line access for affected systems to trusted users. For more information, refer to SOL13309: Restricting access to the Configuration utility by source IP address (11.x) and SOL13092: Overview of securing access to the BIG-IP system.
To mitigate this vulnerability for ARX, you should use the CLI instead of the ARX Manager GUI.