@EndlessMason
I am only familiar with F5 BIG-IP so I will speak to that:
For F5 BIG-IP it appears that threat modeling when the HTTP/2 profile was introduced drove a conservative setting of 10 max concurrent streams, so yes, if you have the default, its most likely good enough to prevent this vector from having disparate impact.
Since the BIG-IP HTTP/2 profile waits for a request to open a backend connection, this means the only impact for this attack is in BIG-IP, so the attack may be complete absorbed by BIG-IP without issue.
There will likely not be any Advanced WAF signatures as the WAF is not engaged until a request is received.