Vulnerability Recommended Actions
If you are running a version listed in the Versions known to be vulnerable column, you can eliminate this vulnerability by upgrading to a version listed in the Versions known to be not vulnerable column. If the table lists only an older version than what you are currently running, or does not list a non-vulnerable version, then no upgrade candidate currently exists.
To mitigate this vulnerability, you can disable image optimization for ICON and PICT files by BIG-IP AAM or BIG-IP WebAccelerator policy, or ensure that only trusted ICON or PICT files are processed by controlling access to image files on pool members.
Impact of action: Performing the recommended actions should not have a negative impact on your system.
Note: For information about how to locate F5 product guides, refer to SOL12453464: Finding producct documentation on AskF5.