Considering a scenario where an international space station's proprietary operational software is discovered to have numerous zero-day and critical vulnerabilities. Why would the unique implications of these specific vulnerabilities in such a high-stakes and isolated environment necessitate an immediate and expedited response?