OpenSSL released a security advisory on October 30, 2018 describing the vulnerability CVE-2018-0734 [1].
Airlock WAF is not affected
The vulnerability affects the DSA signature algorithm and has a low severity according to OpenSSL (OpenSSL did not even publish a new release at the time of the security advisory). Airlock WAF is not affected because this algorithm is only used with DSA certificates. Airlock WAF only supports RSA certificates in the configuration center and is therefore not affected by default. Even if a DSA certificate is configured using Apache Expert settings a successful attack is very unlikely.
No action required.