CVE-2025-66596: CWE-601 URL Redirection to Untrusted Site ('Open Redirect') in Yokogawa Electric Corporation FAST/TOOLS
CVE-2025-66596 is an open redirect vulnerability in Yokogawa Electric Corporation's FAST/TOOLS software versions R9. 01 through R10. 04. The product fails to properly validate the Host header in HTTP requests, allowing attackers to craft malicious URLs that redirect users to untrusted external sites without user interaction or authentication. This vulnerability has a CVSS 4. 0 base score of 6. 9, indicating medium severity. Exploitation could lead to phishing attacks or redirection to malicious domains, potentially compromising user trust and leading to further attacks. No known exploits are currently in the wild. European organizations using FAST/TOOLS in critical industrial control systems could face targeted phishing or social engineering campaigns leveraging this flaw.
AI Analysis
Technical Summary
CVE-2025-66596 is an open redirect vulnerability classified under CWE-601 affecting Yokogawa Electric Corporation's FAST/TOOLS software, specifically versions R9.01 through R10.04 across multiple packages including RVSVRN, UNSVRN, HMIWEB, FTEES, and HMIMOB. The vulnerability arises because the software does not properly validate the Host header in incoming HTTP requests. An attacker can exploit this by inserting a malicious or invalid Host header, causing the application to redirect users to untrusted external websites without their consent or awareness. This flaw does not require authentication or user interaction to be triggered, increasing its risk profile. The CVSS 4.0 vector (AV:N/AC:L/AT:N/UI:N/VC:N/VI:L/VA:N/SC:N/SI:L/SA:N) indicates network attack vector, low attack complexity, no privileges or user interaction needed, and limited impact on confidentiality and availability but some impact on integrity due to redirection. While no public exploits are known, the vulnerability could be leveraged in phishing or social engineering campaigns to redirect legitimate users to malicious sites, potentially leading to credential theft, malware infection, or further exploitation. The vulnerability affects critical industrial control system software widely used in process automation and monitoring, making it a concern for operational technology environments.
Potential Impact
For European organizations, particularly those in industrial sectors such as manufacturing, energy, and utilities that rely on Yokogawa FAST/TOOLS for process control and monitoring, this vulnerability poses a risk of user redirection to malicious sites. This could facilitate phishing attacks targeting operators or engineers, potentially leading to credential compromise or delivery of malware into critical infrastructure environments. The integrity of operational workflows could be undermined if users are misled by malicious redirects, causing operational disruptions or data leakage. Although the vulnerability does not directly allow remote code execution or system takeover, the indirect impact through social engineering could be significant. Given the critical nature of industrial control systems in Europe and the increasing targeting of OT environments by threat actors, this vulnerability could be exploited in targeted campaigns against European industrial enterprises. The lack of required authentication and user interaction lowers the barrier for exploitation, increasing the threat surface. However, the absence of known exploits in the wild currently limits immediate risk.
Mitigation Recommendations
To mitigate CVE-2025-66596, organizations should implement strict validation of the Host header within FAST/TOOLS HTTP requests, ensuring that only expected and trusted hostnames are accepted. This may require applying vendor patches or configuration changes once available. In the interim, network-level controls such as web application firewalls (WAFs) can be configured to detect and block suspicious Host header values or redirect attempts. Security teams should monitor logs for anomalous redirect activity and educate users, especially operational staff, about the risks of clicking on unexpected URLs or redirects. Implementing multi-factor authentication (MFA) for access to FAST/TOOLS interfaces can reduce the impact of credential theft resulting from phishing. Segmentation of OT networks from corporate IT and internet-facing systems can limit exposure. Regular vulnerability scanning and penetration testing focused on web interfaces should be conducted to identify similar issues. Finally, organizations should maintain close communication with Yokogawa for updates and patches addressing this vulnerability.
Affected Countries
Germany, France, Italy, United Kingdom, Netherlands, Belgium, Sweden
CVE-2025-66596: CWE-601 URL Redirection to Untrusted Site ('Open Redirect') in Yokogawa Electric Corporation FAST/TOOLS
Description
CVE-2025-66596 is an open redirect vulnerability in Yokogawa Electric Corporation's FAST/TOOLS software versions R9. 01 through R10. 04. The product fails to properly validate the Host header in HTTP requests, allowing attackers to craft malicious URLs that redirect users to untrusted external sites without user interaction or authentication. This vulnerability has a CVSS 4. 0 base score of 6. 9, indicating medium severity. Exploitation could lead to phishing attacks or redirection to malicious domains, potentially compromising user trust and leading to further attacks. No known exploits are currently in the wild. European organizations using FAST/TOOLS in critical industrial control systems could face targeted phishing or social engineering campaigns leveraging this flaw.
AI-Powered Analysis
Technical Analysis
CVE-2025-66596 is an open redirect vulnerability classified under CWE-601 affecting Yokogawa Electric Corporation's FAST/TOOLS software, specifically versions R9.01 through R10.04 across multiple packages including RVSVRN, UNSVRN, HMIWEB, FTEES, and HMIMOB. The vulnerability arises because the software does not properly validate the Host header in incoming HTTP requests. An attacker can exploit this by inserting a malicious or invalid Host header, causing the application to redirect users to untrusted external websites without their consent or awareness. This flaw does not require authentication or user interaction to be triggered, increasing its risk profile. The CVSS 4.0 vector (AV:N/AC:L/AT:N/UI:N/VC:N/VI:L/VA:N/SC:N/SI:L/SA:N) indicates network attack vector, low attack complexity, no privileges or user interaction needed, and limited impact on confidentiality and availability but some impact on integrity due to redirection. While no public exploits are known, the vulnerability could be leveraged in phishing or social engineering campaigns to redirect legitimate users to malicious sites, potentially leading to credential theft, malware infection, or further exploitation. The vulnerability affects critical industrial control system software widely used in process automation and monitoring, making it a concern for operational technology environments.
Potential Impact
For European organizations, particularly those in industrial sectors such as manufacturing, energy, and utilities that rely on Yokogawa FAST/TOOLS for process control and monitoring, this vulnerability poses a risk of user redirection to malicious sites. This could facilitate phishing attacks targeting operators or engineers, potentially leading to credential compromise or delivery of malware into critical infrastructure environments. The integrity of operational workflows could be undermined if users are misled by malicious redirects, causing operational disruptions or data leakage. Although the vulnerability does not directly allow remote code execution or system takeover, the indirect impact through social engineering could be significant. Given the critical nature of industrial control systems in Europe and the increasing targeting of OT environments by threat actors, this vulnerability could be exploited in targeted campaigns against European industrial enterprises. The lack of required authentication and user interaction lowers the barrier for exploitation, increasing the threat surface. However, the absence of known exploits in the wild currently limits immediate risk.
Mitigation Recommendations
To mitigate CVE-2025-66596, organizations should implement strict validation of the Host header within FAST/TOOLS HTTP requests, ensuring that only expected and trusted hostnames are accepted. This may require applying vendor patches or configuration changes once available. In the interim, network-level controls such as web application firewalls (WAFs) can be configured to detect and block suspicious Host header values or redirect attempts. Security teams should monitor logs for anomalous redirect activity and educate users, especially operational staff, about the risks of clicking on unexpected URLs or redirects. Implementing multi-factor authentication (MFA) for access to FAST/TOOLS interfaces can reduce the impact of credential theft resulting from phishing. Segmentation of OT networks from corporate IT and internet-facing systems can limit exposure. Regular vulnerability scanning and penetration testing focused on web interfaces should be conducted to identify similar issues. Finally, organizations should maintain close communication with Yokogawa for updates and patches addressing this vulnerability.
Affected Countries
Technical Details
- Data Version
- 5.2
- Assigner Short Name
- YokogawaGroup
- Date Reserved
- 2025-12-05T05:04:18.582Z
- Cvss Version
- 4.0
- State
- PUBLISHED
Threat ID: 698963134b57a58fa121383c
Added to database: 2/9/2026, 4:31:15 AM
Last enriched: 2/9/2026, 4:46:18 AM
Last updated: 2/9/2026, 6:52:46 AM
Views: 7
Community Reviews
0 reviewsCrowdsource mitigation strategies, share intel context, and vote on the most helpful responses. Sign in to add your voice and help keep defenders ahead.
Want to contribute mitigation steps or threat intel context? Sign in or create an account to join the community discussion.
Related Threats
CVE-2026-2220: SQL Injection in code-projects Online Reviewer System
MediumCVE-2026-1868: CWE-1336: Improper Neutralization of Special Elements Used in a Template Engine in GitLab GitLab AI Gateway
CriticalCVE-2026-0870: CWE-250 Execution with Unnecessary Privileges in GIGABYTE MacroHub
HighCVE-2026-2218: Command Injection in D-Link DCS-933L
MediumCVE-2026-22613: CWE-295 Improper Certificate Validation in Eaton Network M3
MediumActions
Updates to AI analysis require Pro Console access. Upgrade inside Console → Billing.
External Links
Need more coverage?
Upgrade to Pro Console in Console -> Billing for AI refresh and higher limits.
For incident response and remediation, OffSeq services can help resolve threats faster.