@jpgpi250
You don't need to.
If pfSense was a file server, or web server, then these packages could expose services exposed to the Internet. This would mean that a known bug could be important for you.
Or, pfSense is a firewall, so most if not all vulnerabilities are not accessible.
You can make the system even more safe by limiting the admin access on the LANs side to a known interface like LAN, and use other interfaces for all your other local devices, or make the admin interface only accessible to the device you use to admin pfSense.
Take one example : the openvpn plugin issue : these plugins are not installed on pfSense.
You are most probably not using dnsmasq, as unbound, the resolver is the default.
Most, if not all of these vulnerabilities are always known to the pfSense Netgate dev team, as they are the one also the ones that contribute to FreeBSD. If a patch is available, they will rebuild the package and update it in the repository.
You can run once in a while option 13, as this will update pfSense FreeBSD packages maintained by Netgate.
I've automated the scan for available system packages for pfSense with a script. If a package is up-datable, I'll receive a mail.
edit : Btw : I'm just another pfSense user. If needed, 'they' will give more info.