Thank you for the clarification, @738ea36e. From the message you mentioned, it seems like the attack in question involves a vulnerability in a specific software. Without knowing more details about the software and the specific vulnerability, it's difficult to suggest an alternative mitigation approach.
Have you tried reaching out to the software vendor or a security expert for guidance on how to address the vulnerability? It's important to take swift action to protect your system and data from potential attacks.