CVE-2025-66596: CWE-601 URL Redirection to Untrusted Site ('Open Redirect') in Yokogawa Electric Corporation FAST/TOOLS
CVE-2025-66596 is an open redirect vulnerability in Yokogawa Electric Corporation's FAST/TOOLS software versions R9. 01 through R10. 04. The product fails to properly validate the Host header in HTTP requests, allowing attackers to craft malicious URLs that redirect users to untrusted, potentially harmful websites without user interaction or authentication. This vulnerability has a CVSS 4. 0 score of 6. 9, indicating medium severity. While no known exploits are currently reported in the wild, exploitation could facilitate phishing or social engineering attacks by leveraging trusted FAST/TOOLS URLs. European organizations using FAST/TOOLS in critical industrial control systems could face reputational damage and increased risk of secondary attacks. Mitigation requires strict validation of Host headers, applying vendor patches when available, and monitoring for suspicious redirects.
AI Analysis
Technical Summary
CVE-2025-66596 is an open redirect vulnerability identified in Yokogawa Electric Corporation's FAST/TOOLS software, specifically affecting versions from R9.01 to R10.04 across several packages including RVSVRN, UNSVRN, HMIWEB, FTEES, and HMIMOB. The core issue arises from improper validation of the HTTP Host header in incoming requests. An attacker can manipulate this header to inject an invalid or malicious host value, causing the application to redirect users to external, untrusted websites. This behavior can be exploited without requiring authentication or user interaction, increasing the attack surface. The vulnerability is classified under CWE-601 (URL Redirection to Untrusted Site) and has a CVSS 4.0 base score of 6.9, reflecting medium severity. The vector metrics indicate network attack vector, low attack complexity, no privileges or user interaction needed, and limited impact on confidentiality and availability but some impact on integrity via limited scope. Although no public exploits have been reported, the vulnerability could be leveraged in phishing campaigns or to bypass security controls by redirecting users from a trusted domain to malicious sites. FAST/TOOLS is widely used in industrial automation and control systems, making this vulnerability particularly relevant to critical infrastructure environments. The lack of current patches or exploit code underscores the importance of proactive mitigation and monitoring.
Potential Impact
For European organizations, especially those operating critical infrastructure and industrial control systems, this vulnerability poses a significant risk. FAST/TOOLS is a SCADA and industrial automation platform used in sectors such as energy, manufacturing, and utilities. An attacker exploiting this vulnerability could redirect legitimate users to malicious websites designed to harvest credentials, deliver malware, or conduct further social engineering attacks. This could lead to compromised user accounts, unauthorized access to sensitive operational data, or disruption of industrial processes. The indirect impact includes reputational damage, regulatory non-compliance (e.g., under NIS2 Directive), and potential financial losses due to operational downtime or incident response costs. Since exploitation requires no authentication or user interaction, the threat is more accessible to remote attackers, increasing the likelihood of targeted phishing campaigns leveraging trusted FAST/TOOLS URLs. The medium severity rating reflects moderate risk but given the critical nature of affected systems, the impact could be amplified in practice.
Mitigation Recommendations
1. Implement strict validation of the Host header on all FAST/TOOLS web interfaces to ensure only legitimate, expected hostnames are accepted. 2. Monitor and filter incoming HTTP requests at the network perimeter to detect and block suspicious or malformed Host headers. 3. Apply vendor-provided patches or updates as soon as they become available; maintain close communication with Yokogawa for security advisories. 4. Employ web application firewalls (WAFs) configured to detect and prevent open redirect attempts targeting FAST/TOOLS URLs. 5. Conduct user awareness training focused on recognizing suspicious URLs and phishing attempts that may exploit this vulnerability. 6. Review and restrict external access to FAST/TOOLS management interfaces, limiting exposure to trusted networks or VPNs. 7. Implement logging and alerting for unusual redirect activities to enable rapid detection and response. 8. Regularly audit and update security policies related to industrial control system web portals to incorporate this vulnerability context.
Affected Countries
Germany, France, Italy, United Kingdom, Netherlands, Belgium, Sweden
CVE-2025-66596: CWE-601 URL Redirection to Untrusted Site ('Open Redirect') in Yokogawa Electric Corporation FAST/TOOLS
Description
CVE-2025-66596 is an open redirect vulnerability in Yokogawa Electric Corporation's FAST/TOOLS software versions R9. 01 through R10. 04. The product fails to properly validate the Host header in HTTP requests, allowing attackers to craft malicious URLs that redirect users to untrusted, potentially harmful websites without user interaction or authentication. This vulnerability has a CVSS 4. 0 score of 6. 9, indicating medium severity. While no known exploits are currently reported in the wild, exploitation could facilitate phishing or social engineering attacks by leveraging trusted FAST/TOOLS URLs. European organizations using FAST/TOOLS in critical industrial control systems could face reputational damage and increased risk of secondary attacks. Mitigation requires strict validation of Host headers, applying vendor patches when available, and monitoring for suspicious redirects.
AI-Powered Analysis
Machine-generated threat intelligence
Technical Analysis
CVE-2025-66596 is an open redirect vulnerability identified in Yokogawa Electric Corporation's FAST/TOOLS software, specifically affecting versions from R9.01 to R10.04 across several packages including RVSVRN, UNSVRN, HMIWEB, FTEES, and HMIMOB. The core issue arises from improper validation of the HTTP Host header in incoming requests. An attacker can manipulate this header to inject an invalid or malicious host value, causing the application to redirect users to external, untrusted websites. This behavior can be exploited without requiring authentication or user interaction, increasing the attack surface. The vulnerability is classified under CWE-601 (URL Redirection to Untrusted Site) and has a CVSS 4.0 base score of 6.9, reflecting medium severity. The vector metrics indicate network attack vector, low attack complexity, no privileges or user interaction needed, and limited impact on confidentiality and availability but some impact on integrity via limited scope. Although no public exploits have been reported, the vulnerability could be leveraged in phishing campaigns or to bypass security controls by redirecting users from a trusted domain to malicious sites. FAST/TOOLS is widely used in industrial automation and control systems, making this vulnerability particularly relevant to critical infrastructure environments. The lack of current patches or exploit code underscores the importance of proactive mitigation and monitoring.
Potential Impact
For European organizations, especially those operating critical infrastructure and industrial control systems, this vulnerability poses a significant risk. FAST/TOOLS is a SCADA and industrial automation platform used in sectors such as energy, manufacturing, and utilities. An attacker exploiting this vulnerability could redirect legitimate users to malicious websites designed to harvest credentials, deliver malware, or conduct further social engineering attacks. This could lead to compromised user accounts, unauthorized access to sensitive operational data, or disruption of industrial processes. The indirect impact includes reputational damage, regulatory non-compliance (e.g., under NIS2 Directive), and potential financial losses due to operational downtime or incident response costs. Since exploitation requires no authentication or user interaction, the threat is more accessible to remote attackers, increasing the likelihood of targeted phishing campaigns leveraging trusted FAST/TOOLS URLs. The medium severity rating reflects moderate risk but given the critical nature of affected systems, the impact could be amplified in practice.
Mitigation Recommendations
1. Implement strict validation of the Host header on all FAST/TOOLS web interfaces to ensure only legitimate, expected hostnames are accepted. 2. Monitor and filter incoming HTTP requests at the network perimeter to detect and block suspicious or malformed Host headers. 3. Apply vendor-provided patches or updates as soon as they become available; maintain close communication with Yokogawa for security advisories. 4. Employ web application firewalls (WAFs) configured to detect and prevent open redirect attempts targeting FAST/TOOLS URLs. 5. Conduct user awareness training focused on recognizing suspicious URLs and phishing attempts that may exploit this vulnerability. 6. Review and restrict external access to FAST/TOOLS management interfaces, limiting exposure to trusted networks or VPNs. 7. Implement logging and alerting for unusual redirect activities to enable rapid detection and response. 8. Regularly audit and update security policies related to industrial control system web portals to incorporate this vulnerability context.
Affected Countries
Technical Details
- Data Version
- 5.2
- Assigner Short Name
- YokogawaGroup
- Date Reserved
- 2025-12-05T05:04:18.582Z
- Cvss Version
- 4.0
- State
- PUBLISHED
Threat ID: 698963134b57a58fa121383c
Added to database: 2/9/2026, 4:31:15 AM
Last enriched: 2/16/2026, 1:18:25 PM
Last updated: 3/25/2026, 10:16:11 AM
Views: 60
Community Reviews
0 reviewsCrowdsource mitigation strategies, share intel context, and vote on the most helpful responses. Sign in to add your voice and help keep defenders ahead.
Want to contribute mitigation steps or threat intel context? Sign in or create an account to join the community discussion.
Actions
Updates to AI analysis require Pro Console access. Upgrade inside Console → Billing.
External Links
Need more coverage?
Upgrade to Pro Console for AI refresh and higher limits.
For incident response and remediation, OffSeq services can help resolve threats faster.
Latest Threats
Check if your credentials are on the dark web
Instant breach scanning across billions of leaked records. Free tier available.