It requires kernel level access to abuse, so it will probably be mostly used in targeted attacks. General good technical hygiene should be good enough to prevent becoming a random victim.
Maybe someone will prove me wrong, but I think there is still not enough public information about the vulnerability and the possible mitigations to answer your questions thoroughly.