During a vulnerability assessment, a vulnerability is discovered that affects both internal workstations and external web servers. Considering the scope, which factor should be prioritized for mitigating this vulnerability?
The proximity of potential attackers to your systems
The potential impact on both internal and external systems
The likelihood of exploitation by known threats
Regulatory requirements for mitigating vulnerabilities