Skip to main content
Press slash or control plus K to focus the search. Use the arrow keys to navigate results and press enter to open a threat.
Reconnecting to live updates…

CVE-2025-66596: CWE-601 URL Redirection to Untrusted Site ('Open Redirect') in Yokogawa Electric Corporation FAST/TOOLS

0
Medium
VulnerabilityCVE-2025-66596cvecve-2025-66596cwe-601
Published: Mon Feb 09 2026 (02/09/2026, 03:35:28 UTC)
Source: CVE Database V5
Vendor/Project: Yokogawa Electric Corporation
Product: FAST/TOOLS

Description

CVE-2025-66596 is an open redirect vulnerability in Yokogawa Electric Corporation's FAST/TOOLS software versions R9. 01 through R10. 04. The product fails to properly validate the Host header in HTTP requests, allowing attackers to craft malicious URLs that redirect users to untrusted external sites without user interaction or authentication. This vulnerability has a CVSS 4. 0 base score of 6. 9, indicating medium severity. Exploitation could lead to phishing attacks or redirection to malicious domains, potentially compromising user trust and leading to further attacks. No known exploits are currently in the wild. European organizations using FAST/TOOLS in critical industrial control systems could face targeted phishing or social engineering campaigns leveraging this flaw.

AI-Powered Analysis

AILast updated: 02/09/2026, 04:46:18 UTC

Technical Analysis

CVE-2025-66596 is an open redirect vulnerability classified under CWE-601 affecting Yokogawa Electric Corporation's FAST/TOOLS software, specifically versions R9.01 through R10.04 across multiple packages including RVSVRN, UNSVRN, HMIWEB, FTEES, and HMIMOB. The vulnerability arises because the software does not properly validate the Host header in incoming HTTP requests. An attacker can exploit this by inserting a malicious or invalid Host header, causing the application to redirect users to untrusted external websites without their consent or awareness. This flaw does not require authentication or user interaction to be triggered, increasing its risk profile. The CVSS 4.0 vector (AV:N/AC:L/AT:N/UI:N/VC:N/VI:L/VA:N/SC:N/SI:L/SA:N) indicates network attack vector, low attack complexity, no privileges or user interaction needed, and limited impact on confidentiality and availability but some impact on integrity due to redirection. While no public exploits are known, the vulnerability could be leveraged in phishing or social engineering campaigns to redirect legitimate users to malicious sites, potentially leading to credential theft, malware infection, or further exploitation. The vulnerability affects critical industrial control system software widely used in process automation and monitoring, making it a concern for operational technology environments.

Potential Impact

For European organizations, particularly those in industrial sectors such as manufacturing, energy, and utilities that rely on Yokogawa FAST/TOOLS for process control and monitoring, this vulnerability poses a risk of user redirection to malicious sites. This could facilitate phishing attacks targeting operators or engineers, potentially leading to credential compromise or delivery of malware into critical infrastructure environments. The integrity of operational workflows could be undermined if users are misled by malicious redirects, causing operational disruptions or data leakage. Although the vulnerability does not directly allow remote code execution or system takeover, the indirect impact through social engineering could be significant. Given the critical nature of industrial control systems in Europe and the increasing targeting of OT environments by threat actors, this vulnerability could be exploited in targeted campaigns against European industrial enterprises. The lack of required authentication and user interaction lowers the barrier for exploitation, increasing the threat surface. However, the absence of known exploits in the wild currently limits immediate risk.

Mitigation Recommendations

To mitigate CVE-2025-66596, organizations should implement strict validation of the Host header within FAST/TOOLS HTTP requests, ensuring that only expected and trusted hostnames are accepted. This may require applying vendor patches or configuration changes once available. In the interim, network-level controls such as web application firewalls (WAFs) can be configured to detect and block suspicious Host header values or redirect attempts. Security teams should monitor logs for anomalous redirect activity and educate users, especially operational staff, about the risks of clicking on unexpected URLs or redirects. Implementing multi-factor authentication (MFA) for access to FAST/TOOLS interfaces can reduce the impact of credential theft resulting from phishing. Segmentation of OT networks from corporate IT and internet-facing systems can limit exposure. Regular vulnerability scanning and penetration testing focused on web interfaces should be conducted to identify similar issues. Finally, organizations should maintain close communication with Yokogawa for updates and patches addressing this vulnerability.

Need more detailed analysis?Upgrade to Pro Console

Technical Details

Data Version
5.2
Assigner Short Name
YokogawaGroup
Date Reserved
2025-12-05T05:04:18.582Z
Cvss Version
4.0
State
PUBLISHED

Threat ID: 698963134b57a58fa121383c

Added to database: 2/9/2026, 4:31:15 AM

Last enriched: 2/9/2026, 4:46:18 AM

Last updated: 2/9/2026, 6:52:46 AM

Views: 7

Community Reviews

0 reviews

Crowdsource mitigation strategies, share intel context, and vote on the most helpful responses. Sign in to add your voice and help keep defenders ahead.

Sort by
Loading community insights…

Want to contribute mitigation steps or threat intel context? Sign in or create an account to join the community discussion.

Actions

PRO

Updates to AI analysis require Pro Console access. Upgrade inside Console → Billing.

Please log in to the Console to use AI analysis features.

Need more coverage?

Upgrade to Pro Console in Console -> Billing for AI refresh and higher limits.

For incident response and remediation, OffSeq services can help resolve threats faster.

Latest Threats