A significant security vulnerability, actively exploited since mid-July, demands immediate patching and log review. Security teams must prioritize identification and remediation as attackers have had weeks of unmitigated access to vulnerable systems.