CVE-2025-66594: CWE-209 Generation of Error Message Containing Sensitive Information in Yokogawa Electric Corporation FAST/TOOLS
CVE-2025-66594 is a medium-severity vulnerability in Yokogawa Electric Corporation's FAST/TOOLS software versions R9. 01 to R10. 04. The flaw involves detailed error messages that expose sensitive information, which attackers could leverage to facilitate further attacks. The vulnerability requires no authentication or user interaction and can be exploited remotely over the network. Although no known exploits are currently in the wild, the information disclosure risk could aid attackers in reconnaissance or crafting targeted attacks. European organizations using FAST/TOOLS in critical industrial control systems may face increased risk, particularly in countries with significant industrial automation sectors. Mitigation involves restricting error message detail exposure, applying vendor patches when available, and implementing network segmentation and monitoring. Countries like Germany, France, Italy, and the UK are likely most affected due to their industrial base and usage of such control systems.
AI Analysis
Technical Summary
CVE-2025-66594 is a vulnerability classified under CWE-209, which pertains to the generation of error messages containing sensitive information. This issue affects Yokogawa Electric Corporation's FAST/TOOLS software, specifically versions from R9.01 through R10.04, including packages RVSVRN, UNSVRN, HMIWEB, FTEES, and HMIMOB. The vulnerability arises because the software displays detailed error messages that reveal sensitive internal information on error pages. Such information disclosure can provide attackers with insights into system configurations, software versions, or other data that can be leveraged to mount more sophisticated attacks, such as targeted exploitation or privilege escalation. The CVSS 4.0 base score is 6.9, indicating a medium severity level. The vector indicates the vulnerability is remotely exploitable over the network (AV:N), requires no privileges (PR:N), no user interaction (UI:N), and does not affect confidentiality, integrity, or availability directly (VC:L, VI:N, VA:N). The vulnerability does not require authentication and can be exploited without user interaction, increasing its risk profile. No patches are currently linked, and no known exploits are reported in the wild, but the exposure of sensitive information in error messages is a recognized security risk, especially in industrial control systems where FAST/TOOLS is used for monitoring and control. The vulnerability was reserved in December 2025 and published in February 2026.
Potential Impact
For European organizations, especially those operating critical infrastructure and industrial control systems, this vulnerability poses a risk of information leakage that could facilitate further attacks. FAST/TOOLS is widely used in process automation and control environments, including energy, manufacturing, and utilities sectors. Disclosure of sensitive error information can aid attackers in mapping system architecture, identifying software versions, or discovering configuration details, which can be used to craft targeted exploits or conduct reconnaissance for more damaging attacks. Although the vulnerability does not directly compromise confidentiality, integrity, or availability, the indirect impact through enabling subsequent attacks could be significant. European countries with large industrial bases and advanced manufacturing sectors—such as Germany, France, Italy, and the UK—are particularly at risk. The vulnerability could also affect organizations involved in energy production and distribution, where Yokogawa products are often deployed. The lack of known exploits reduces immediate risk but does not eliminate the potential for future exploitation.
Mitigation Recommendations
1. Limit the detail of error messages exposed to end users by configuring FAST/TOOLS to display generic error responses instead of detailed diagnostic information. 2. Monitor network traffic and logs for unusual access patterns or repeated error page requests that could indicate reconnaissance attempts. 3. Implement strict network segmentation to isolate FAST/TOOLS systems from general enterprise networks and restrict access to authorized personnel only. 4. Apply vendor patches or updates as soon as they become available, and maintain close communication with Yokogawa for security advisories. 5. Conduct regular security assessments and penetration testing focused on error handling and information leakage in industrial control systems. 6. Use web application firewalls (WAFs) or intrusion detection/prevention systems (IDS/IPS) to detect and block attempts to exploit error message disclosures. 7. Train operational technology (OT) and IT staff on the risks associated with information disclosure vulnerabilities and best practices for secure error handling.
Affected Countries
Germany, France, Italy, United Kingdom, Netherlands, Belgium, Sweden
CVE-2025-66594: CWE-209 Generation of Error Message Containing Sensitive Information in Yokogawa Electric Corporation FAST/TOOLS
Description
CVE-2025-66594 is a medium-severity vulnerability in Yokogawa Electric Corporation's FAST/TOOLS software versions R9. 01 to R10. 04. The flaw involves detailed error messages that expose sensitive information, which attackers could leverage to facilitate further attacks. The vulnerability requires no authentication or user interaction and can be exploited remotely over the network. Although no known exploits are currently in the wild, the information disclosure risk could aid attackers in reconnaissance or crafting targeted attacks. European organizations using FAST/TOOLS in critical industrial control systems may face increased risk, particularly in countries with significant industrial automation sectors. Mitigation involves restricting error message detail exposure, applying vendor patches when available, and implementing network segmentation and monitoring. Countries like Germany, France, Italy, and the UK are likely most affected due to their industrial base and usage of such control systems.
AI-Powered Analysis
Technical Analysis
CVE-2025-66594 is a vulnerability classified under CWE-209, which pertains to the generation of error messages containing sensitive information. This issue affects Yokogawa Electric Corporation's FAST/TOOLS software, specifically versions from R9.01 through R10.04, including packages RVSVRN, UNSVRN, HMIWEB, FTEES, and HMIMOB. The vulnerability arises because the software displays detailed error messages that reveal sensitive internal information on error pages. Such information disclosure can provide attackers with insights into system configurations, software versions, or other data that can be leveraged to mount more sophisticated attacks, such as targeted exploitation or privilege escalation. The CVSS 4.0 base score is 6.9, indicating a medium severity level. The vector indicates the vulnerability is remotely exploitable over the network (AV:N), requires no privileges (PR:N), no user interaction (UI:N), and does not affect confidentiality, integrity, or availability directly (VC:L, VI:N, VA:N). The vulnerability does not require authentication and can be exploited without user interaction, increasing its risk profile. No patches are currently linked, and no known exploits are reported in the wild, but the exposure of sensitive information in error messages is a recognized security risk, especially in industrial control systems where FAST/TOOLS is used for monitoring and control. The vulnerability was reserved in December 2025 and published in February 2026.
Potential Impact
For European organizations, especially those operating critical infrastructure and industrial control systems, this vulnerability poses a risk of information leakage that could facilitate further attacks. FAST/TOOLS is widely used in process automation and control environments, including energy, manufacturing, and utilities sectors. Disclosure of sensitive error information can aid attackers in mapping system architecture, identifying software versions, or discovering configuration details, which can be used to craft targeted exploits or conduct reconnaissance for more damaging attacks. Although the vulnerability does not directly compromise confidentiality, integrity, or availability, the indirect impact through enabling subsequent attacks could be significant. European countries with large industrial bases and advanced manufacturing sectors—such as Germany, France, Italy, and the UK—are particularly at risk. The vulnerability could also affect organizations involved in energy production and distribution, where Yokogawa products are often deployed. The lack of known exploits reduces immediate risk but does not eliminate the potential for future exploitation.
Mitigation Recommendations
1. Limit the detail of error messages exposed to end users by configuring FAST/TOOLS to display generic error responses instead of detailed diagnostic information. 2. Monitor network traffic and logs for unusual access patterns or repeated error page requests that could indicate reconnaissance attempts. 3. Implement strict network segmentation to isolate FAST/TOOLS systems from general enterprise networks and restrict access to authorized personnel only. 4. Apply vendor patches or updates as soon as they become available, and maintain close communication with Yokogawa for security advisories. 5. Conduct regular security assessments and penetration testing focused on error handling and information leakage in industrial control systems. 6. Use web application firewalls (WAFs) or intrusion detection/prevention systems (IDS/IPS) to detect and block attempts to exploit error message disclosures. 7. Train operational technology (OT) and IT staff on the risks associated with information disclosure vulnerabilities and best practices for secure error handling.
Affected Countries
Technical Details
- Data Version
- 5.2
- Assigner Short Name
- YokogawaGroup
- Date Reserved
- 2025-12-05T05:04:18.581Z
- Cvss Version
- 4.0
- State
- PUBLISHED
Threat ID: 698963134b57a58fa1213836
Added to database: 2/9/2026, 4:31:15 AM
Last enriched: 2/16/2026, 1:17:38 PM
Last updated: 2/21/2026, 2:16:48 AM
Views: 31
Community Reviews
0 reviewsCrowdsource mitigation strategies, share intel context, and vote on the most helpful responses. Sign in to add your voice and help keep defenders ahead.
Want to contribute mitigation steps or threat intel context? Sign in or create an account to join the community discussion.
Related Threats
CVE-2026-27203: CWE-15: External Control of System or Configuration Setting in YosefHayim ebay-mcp
HighCVE-2026-27168: CWE-122: Heap-based Buffer Overflow in HappySeaFox sail
HighCVE-2026-27134: CWE-287: Improper Authentication in strimzi strimzi-kafka-operator
HighCVE-2026-27190: CWE-78: Improper Neutralization of Special Elements used in an OS Command ('OS Command Injection') in denoland deno
HighCVE-2026-27026: CWE-770: Allocation of Resources Without Limits or Throttling in py-pdf pypdf
MediumActions
Updates to AI analysis require Pro Console access. Upgrade inside Console → Billing.
External Links
Need more coverage?
Upgrade to Pro Console in Console -> Billing for AI refresh and higher limits.
For incident response and remediation, OffSeq services can help resolve threats faster.