OpenSSH clients in version 5.4 - 7.1 are affected by an information leakage vulnerability due to a bug in the undocumented roaming feature. A malicious SSH server may be able to extract the client's private key [1].
Airlock WAF is not affected because the installed OpenSSH software version is not vulnerable.
No action required for Airlock WAF.