From the article - https://support.f5.com/csp/article/K10751325, here's what i understand.
A specially crafted traffic when sent to the application, may start to consume much memory & leading it to trigger tmm restart followed by core log generation.
When this happens, all the tmm traffic would be dropped & interfaces go down & come back up.
So this is basically a DDOS attack.
At present, there's no disclosure of this exploit in the internet.
so how to check this " When configured as part of a high availability (HA) device group, the BIG-IP system fails over to the peer device." ?
and it seems we have to upgrade the system to fix this vulnerability.