Skip to main content
Press slash or control plus K to focus the search. Use the arrow keys to navigate results and press enter to open a threat.
Reconnecting to live updates…

CVE-2025-66598: CWE-327 Use of a Broken or Risky Cryptographic Algorithm in Yokogawa Electric Corporation FAST/TOOLS

0
High
VulnerabilityCVE-2025-66598cvecve-2025-66598cwe-327
Published: Mon Feb 09 2026 (02/09/2026, 03:26:46 UTC)
Source: CVE Database V5
Vendor/Project: Yokogawa Electric Corporation
Product: FAST/TOOLS

Description

CVE-2025-66598 is a high-severity vulnerability in Yokogawa Electric Corporation's FAST/TOOLS software versions R9. 01 through R10. 04. The issue arises from the product's support for outdated SSL/TLS protocols, which use broken or risky cryptographic algorithms (CWE-327). This weakness potentially allows attackers to decrypt communications between clients and the web server, compromising confidentiality. The vulnerability requires no user interaction and can be exploited remotely without authentication, increasing its risk. Although no known exploits are currently reported in the wild, the vulnerability poses a significant threat to industrial control systems relying on FAST/TOOLS. European organizations using these versions should prioritize patching or mitigating this issue to protect sensitive operational data. Countries with strong industrial automation sectors and critical infrastructure using Yokogawa products are most at risk. Immediate mitigation involves disabling legacy SSL/TLS support and upgrading to secure cryptographic protocols.

AI-Powered Analysis

AILast updated: 02/09/2026, 04:45:33 UTC

Technical Analysis

CVE-2025-66598 identifies a cryptographic vulnerability in Yokogawa Electric Corporation's FAST/TOOLS software, specifically versions R9.01 through R10.04. The root cause is the continued support for outdated SSL/TLS versions that rely on weak cryptographic algorithms, classified under CWE-327 (Use of a Broken or Risky Cryptographic Algorithm). These legacy protocols are susceptible to various cryptographic attacks such as downgrade attacks, cipher block chaining (CBC) attacks, or known weaknesses in older cipher suites, enabling attackers to decrypt intercepted communications. The vulnerability affects multiple FAST/TOOLS packages including RVSVRN, UNSVRN, HMIWEB, FTEES, and HMIMOB, which are components used in industrial automation and control systems. The CVSS 4.0 base score of 7.1 reflects a high severity due to the vulnerability's network attack vector, low attack complexity, no required privileges or user interaction, and a high impact on confidentiality. The vulnerability does not affect integrity or availability significantly but compromises sensitive operational data confidentiality. No patches are currently linked, indicating that users must rely on configuration changes or vendor updates once available. The lack of known exploits in the wild suggests the vulnerability is newly disclosed but should be treated proactively due to the critical nature of industrial control environments. The vulnerability's exploitation could lead to espionage, data leakage, or preparation for further attacks on industrial processes.

Potential Impact

For European organizations, especially those operating critical infrastructure or industrial control systems, this vulnerability poses a significant risk to the confidentiality of operational data. FAST/TOOLS is widely used in sectors such as energy, manufacturing, and utilities, where secure communications are essential to prevent industrial espionage and sabotage. Exploitation could allow attackers to intercept sensitive command and control data, potentially enabling further attacks or disruptions. The impact is heightened in Europe due to stringent data protection regulations (e.g., GDPR) and the strategic importance of industrial automation in the region's economy. Compromise of these systems could lead to regulatory penalties, loss of intellectual property, and damage to national critical infrastructure. Additionally, the vulnerability could be leveraged by state-sponsored actors targeting European industrial assets. The lack of authentication and user interaction requirements means attacks could be automated and widespread if exploited.

Mitigation Recommendations

European organizations should immediately assess their FAST/TOOLS deployments to identify affected versions (R9.01 to R10.04). Until official patches are released, they should disable support for legacy SSL/TLS protocols within FAST/TOOLS configurations, enforcing the use of modern, secure TLS versions (e.g., TLS 1.2 or 1.3) and strong cipher suites. Network segmentation should be enhanced to limit exposure of FAST/TOOLS web servers to untrusted networks. Deploying network intrusion detection systems (NIDS) capable of detecting SSL/TLS downgrade attempts or anomalous encrypted traffic patterns can provide early warning of exploitation attempts. Organizations should also review and update their cryptographic policies to ensure compliance with current best practices and regulatory requirements. Regular vulnerability scanning and penetration testing focused on cryptographic weaknesses in industrial control systems are recommended. Finally, maintain close communication with Yokogawa for timely patch releases and apply updates promptly once available.

Need more detailed analysis?Upgrade to Pro Console

Technical Details

Data Version
5.2
Assigner Short Name
YokogawaGroup
Date Reserved
2025-12-05T05:04:18.582Z
Cvss Version
4.0
State
PUBLISHED

Threat ID: 698963134b57a58fa1213842

Added to database: 2/9/2026, 4:31:15 AM

Last enriched: 2/9/2026, 4:45:33 AM

Last updated: 2/9/2026, 5:41:56 AM

Views: 4

Community Reviews

0 reviews

Crowdsource mitigation strategies, share intel context, and vote on the most helpful responses. Sign in to add your voice and help keep defenders ahead.

Sort by
Loading community insights…

Want to contribute mitigation steps or threat intel context? Sign in or create an account to join the community discussion.

Actions

PRO

Updates to AI analysis require Pro Console access. Upgrade inside Console → Billing.

Please log in to the Console to use AI analysis features.

Need more coverage?

Upgrade to Pro Console in Console -> Billing for AI refresh and higher limits.

For incident response and remediation, OffSeq services can help resolve threats faster.

Latest Threats