以下是简洁的Markdown格式总结从网页截图中获取的关键信息: --- Wind River VXWorks TCP Predictability Vulnerability in ICS Devices (Update B) Overview Alert Code: ICSA-15-169-01B Last Revised: February 04, 2016 Researchers: Raheem Beyah, David Formby, and San Shin Jung Source of Research: Georgia Tech and relevant centers Vulnerability: Predictable TCP sequence vulnerability in VXWorks embedded software. Affected Products VXWorks VxWorks: Version 7, Version 6.9 releases (prior to 6.9.4.4), Version 6.8 releases (prior to 6.8.3), Version 6.7 releases (prior to 6.7.1.1), and Version 6.6 and prior versions (not including 5.5.1 with PNE2.2 and 6.0 through 6.4). VxWorks Cert: Version 6.6.3, Version 6.6.4, Version 6.6.4.1. VxWorks 653: Multiple versions of VxWorks 653Platform specific products are affected. Schneider Electric SAGE RTUs Various models like 1210 RTU, 1230 RTU, and others use CPU cards like C3412. Vulnerability Details CVE: CVE-2015-3963NVD CVSS v2 Base Score: 5.8 Exploitability: Can be exploited remotely with medium skill. Affected Schneider Electric Models: Multiple SAGE RTUs that use various CPU cards. Mitigation Wind River has released patches for multiple versions and users can download them from their websites. Allows asset owners to update to newer, patched versions of VXWorks and VXWorks Cert. ICS-CERT recommends built-in security solutions like firewalls and intrusion detection systems. --- Please expand on specific sections if you need more details.