A cybersecurity analyst is reviewing the vulnerability scan report and notices an entry highlighting a service running an outdated and vulnerable version of SSL, which is susceptible to a well-known exploit that allows an attacker to decrypt sensitive information. Given the widespread knowledge and the availability of exploit code for this vulnerability, what should be the analyst's next step to prioritize this vulnerability?
Schedule a routine review for the next quarter
Prioritize the patching of the affected service
Organize staff training on general cybersecurity awareness