Skip to main content
Press slash or control plus K to focus the search. Use the arrow keys to navigate results and press enter to open a threat.
Reconnecting to live updates…

CVE-2025-66596: CWE-601 URL Redirection to Untrusted Site ('Open Redirect') in Yokogawa Electric Corporation FAST/TOOLS

0
Medium
VulnerabilityCVE-2025-66596cvecve-2025-66596cwe-601
Published: Mon Feb 09 2026 (02/09/2026, 03:35:28 UTC)
Source: CVE Database V5
Vendor/Project: Yokogawa Electric Corporation
Product: FAST/TOOLS

Description

CVE-2025-66596 is an open redirect vulnerability in Yokogawa Electric Corporation's FAST/TOOLS software versions R9. 01 through R10. 04. The product fails to properly validate the Host header in HTTP requests, allowing attackers to craft malicious URLs that redirect users to untrusted, potentially harmful websites without user interaction or authentication. This vulnerability has a CVSS 4. 0 score of 6. 9, indicating medium severity. While no known exploits are currently reported in the wild, exploitation could facilitate phishing or social engineering attacks by leveraging trusted FAST/TOOLS URLs. European organizations using FAST/TOOLS in critical industrial control systems could face reputational damage and increased risk of secondary attacks. Mitigation requires strict validation of Host headers, applying vendor patches when available, and monitoring for suspicious redirects.

AI-Powered Analysis

Machine-generated threat intelligence

AILast updated: 02/16/2026, 13:18:25 UTC

Technical Analysis

CVE-2025-66596 is an open redirect vulnerability identified in Yokogawa Electric Corporation's FAST/TOOLS software, specifically affecting versions from R9.01 to R10.04 across several packages including RVSVRN, UNSVRN, HMIWEB, FTEES, and HMIMOB. The core issue arises from improper validation of the HTTP Host header in incoming requests. An attacker can manipulate this header to inject an invalid or malicious host value, causing the application to redirect users to external, untrusted websites. This behavior can be exploited without requiring authentication or user interaction, increasing the attack surface. The vulnerability is classified under CWE-601 (URL Redirection to Untrusted Site) and has a CVSS 4.0 base score of 6.9, reflecting medium severity. The vector metrics indicate network attack vector, low attack complexity, no privileges or user interaction needed, and limited impact on confidentiality and availability but some impact on integrity via limited scope. Although no public exploits have been reported, the vulnerability could be leveraged in phishing campaigns or to bypass security controls by redirecting users from a trusted domain to malicious sites. FAST/TOOLS is widely used in industrial automation and control systems, making this vulnerability particularly relevant to critical infrastructure environments. The lack of current patches or exploit code underscores the importance of proactive mitigation and monitoring.

Potential Impact

For European organizations, especially those operating critical infrastructure and industrial control systems, this vulnerability poses a significant risk. FAST/TOOLS is a SCADA and industrial automation platform used in sectors such as energy, manufacturing, and utilities. An attacker exploiting this vulnerability could redirect legitimate users to malicious websites designed to harvest credentials, deliver malware, or conduct further social engineering attacks. This could lead to compromised user accounts, unauthorized access to sensitive operational data, or disruption of industrial processes. The indirect impact includes reputational damage, regulatory non-compliance (e.g., under NIS2 Directive), and potential financial losses due to operational downtime or incident response costs. Since exploitation requires no authentication or user interaction, the threat is more accessible to remote attackers, increasing the likelihood of targeted phishing campaigns leveraging trusted FAST/TOOLS URLs. The medium severity rating reflects moderate risk but given the critical nature of affected systems, the impact could be amplified in practice.

Mitigation Recommendations

1. Implement strict validation of the Host header on all FAST/TOOLS web interfaces to ensure only legitimate, expected hostnames are accepted. 2. Monitor and filter incoming HTTP requests at the network perimeter to detect and block suspicious or malformed Host headers. 3. Apply vendor-provided patches or updates as soon as they become available; maintain close communication with Yokogawa for security advisories. 4. Employ web application firewalls (WAFs) configured to detect and prevent open redirect attempts targeting FAST/TOOLS URLs. 5. Conduct user awareness training focused on recognizing suspicious URLs and phishing attempts that may exploit this vulnerability. 6. Review and restrict external access to FAST/TOOLS management interfaces, limiting exposure to trusted networks or VPNs. 7. Implement logging and alerting for unusual redirect activities to enable rapid detection and response. 8. Regularly audit and update security policies related to industrial control system web portals to incorporate this vulnerability context.

Pro Console: star threats, build custom feeds, automate alerts via Slack, email & webhooks.Upgrade to Pro

Technical Details

Data Version
5.2
Assigner Short Name
YokogawaGroup
Date Reserved
2025-12-05T05:04:18.582Z
Cvss Version
4.0
State
PUBLISHED

Threat ID: 698963134b57a58fa121383c

Added to database: 2/9/2026, 4:31:15 AM

Last enriched: 2/16/2026, 1:18:25 PM

Last updated: 3/25/2026, 10:16:11 AM

Views: 60

Community Reviews

0 reviews

Crowdsource mitigation strategies, share intel context, and vote on the most helpful responses. Sign in to add your voice and help keep defenders ahead.

Sort by
Loading community insights…

Want to contribute mitigation steps or threat intel context? Sign in or create an account to join the community discussion.

Actions

PRO

Updates to AI analysis require Pro Console access. Upgrade inside Console → Billing.

Please log in to the Console to use AI analysis features.

Need more coverage?

Upgrade to Pro Console for AI refresh and higher limits.

For incident response and remediation, OffSeq services can help resolve threats faster.

Latest Threats

Breach by OffSeqOFFSEQFRIENDS — 25% OFF

Check if your credentials are on the dark web

Instant breach scanning across billions of leaked records. Free tier available.

Scan now
OffSeq TrainingCredly Certified

Lead Pen Test Professional

Technical5-day eLearningPECB Accredited
View courses