Your company has just identified a critical vulnerability affecting a widely used web server software within your infrastructure. The vulnerability allows an unauthenticated attacker to execute arbitrary code remotely. To remediate this issue, your team needs to prioritize a course of action. What is the MOST appropriate immediate action to take?
Patch the affected systems immediately, following the vendor's guidelines.
Increase the monitoring of web server traffic and look for signs of exploitation.
Schedule the patch to be applied during the next available off-hours maintenance window.
Update the firewall rules to block any traffic that might exploit the vulnerability.