A cybersecurity analyst at an e-commerce company is evaluating the responses from the bug bounty program. One of the reports submitted claims to have found a serious vulnerability that could allow an authenticated user to access other users' shopping cart details. What should be the analyst's FIRST action upon receiving this report?
Apply an immediate patch to address the vulnerability
Notify all users about the potential security breach
Disclose the vulnerability details to all stakeholders
Attempt to replicate the reported vulnerability in a controlled environment
|Incident Response and Management
|Reporting and Communication