A vulnerability scan has identified a critical buffer overflow vulnerability in a production server running a widely used application. Which of the following actions should be taken to best mitigate the risk posed by this vulnerability?
Conduct a detailed audit of the affected system.
Apply the patch released by the application vendor.
Implement network segmentation to isolate the affected server.
Restart the affected application service.