从这个网页截图中可以获取到以下关于漏洞的关键信息: Executive Summary - CVSS v3: 7.8 - Attention Level: Low skill level to exploit - Vendor: Omron - Equipment: CX-One - Vulnerabilities: Untrusted Pointer Dereference, Stack-Based Buffer Overflow, Type Confusion Risk Evaluation - Successful exploitation of these vulnerabilities could crash the device being accessed. Additionally, a buffer overflow condition may allow remote code execution. Technical Details - Affected Products: - CX-One Versions 4.60 and prior - CX-Protocol Versions 2.02 and prior - CX-Server Versions 5.0.28 and prior - CX-Position Versions 2.52 and prior - Vulnerability Overview: - Untrusted Pointer Dereference (CWE-822): CVE-2020-27259, CVSS v3 Base Score: 6.6 - Stack-Based Buffer Overflow (CWE-121): CVE-2020-27261, CVSS v3 Base Score: 7.8 - Type Confusion (CWE-843): CVE-2020-27257, CVSS v3 Base Score: 6.6 - Background: - Critical Infrastructure Sectors: Critical Manufacturing - Countries/Areas Deployed: Worldwide - Company Headquarters Location: Japan - Researcher: rgod, working with Trend Micro’s Zero Day Initiative, reported these vulnerabilities to CISA. Mitigations - Omron has released updated versions of CX-One to address the reported vulnerabilities. - CISA recommends users take the following measures to protect themselves from social engineering attacks: - Do not click web links or open unsolicited attachments in email messages. - Refer to specific links for more information on avoiding email scams and social engineering attacks. - Organizations should perform proper impact analysis and risk assessment before deploying defensive measures.