Skip to main content
Press slash or control plus K to focus the search. Use the arrow keys to navigate results and press enter to open a threat.
Reconnecting to live updates…

CVE-2025-66598: CWE-327 Use of a Broken or Risky Cryptographic Algorithm in Yokogawa Electric Corporation FAST/TOOLS

0
High
VulnerabilityCVE-2025-66598cvecve-2025-66598cwe-327
Published: Mon Feb 09 2026 (02/09/2026, 03:26:46 UTC)
Source: CVE Database V5
Vendor/Project: Yokogawa Electric Corporation
Product: FAST/TOOLS

Description

CVE-2025-66598 is a high-severity vulnerability in Yokogawa Electric Corporation's FAST/TOOLS software versions R9. 01 to R10. 04. The issue arises from the product's support for outdated SSL/TLS protocols, which use broken or risky cryptographic algorithms (CWE-327). This flaw potentially allows attackers to decrypt communications between clients and the web server, compromising confidentiality. The vulnerability requires no user interaction and can be exploited remotely without authentication, increasing its risk. Although no known exploits are currently active in the wild, the vulnerability's presence in critical industrial control system software raises significant concerns. European organizations using FAST/TOOLS in sectors like energy, manufacturing, and utilities are at risk. Mitigation involves disabling legacy SSL/TLS versions, applying vendor patches once available, and implementing network-level protections. Countries with substantial industrial automation deployments, such as Germany, France, Italy, and the UK, are most likely to be affected.

AI-Powered Analysis

Machine-generated threat intelligence

AILast updated: 02/16/2026, 13:19:02 UTC

Technical Analysis

CVE-2025-66598 identifies a cryptographic vulnerability in Yokogawa Electric Corporation's FAST/TOOLS software suite, specifically versions R9.01 through R10.04. The root cause is the continued support for outdated SSL/TLS protocols that rely on weak or broken cryptographic algorithms, categorized under CWE-327. These legacy protocols are susceptible to cryptanalysis attacks that can decrypt intercepted communications, thereby exposing sensitive data transmitted between clients and the FAST/TOOLS web server interface. The vulnerability is remotely exploitable without requiring authentication or user interaction, which significantly lowers the barrier for attackers. FAST/TOOLS is widely used in industrial control systems (ICS) for monitoring and managing critical infrastructure, making the confidentiality breach particularly impactful. The CVSS v4.0 score of 7.1 reflects a high severity, emphasizing the potential for significant data exposure (high confidentiality impact), moderate integrity impact, and low availability impact. No public exploits have been reported yet, but the risk remains elevated due to the critical nature of the affected systems. The lack of available patches at the time of publication necessitates immediate interim mitigations such as disabling legacy SSL/TLS support and enhancing network security controls. This vulnerability underscores the importance of modern cryptographic standards in industrial environments to prevent interception and decryption of sensitive operational data.

Potential Impact

The primary impact of CVE-2025-66598 on European organizations lies in the potential compromise of confidentiality for communications within industrial control systems using FAST/TOOLS. Attackers could decrypt sensitive operational data, including process control commands and monitoring information, which may lead to industrial espionage, operational disruption, or preparation for more advanced attacks. While integrity and availability impacts are lower, the exposure of confidential data can undermine trust and compliance with data protection regulations such as GDPR. European critical infrastructure sectors—energy, manufacturing, utilities—relying on Yokogawa's software are particularly vulnerable. The ability to exploit this vulnerability remotely without authentication increases the attack surface. If exploited, it could facilitate further attacks, including man-in-the-middle (MitM) or replay attacks, potentially disrupting industrial processes. The lack of known exploits in the wild currently reduces immediate risk but does not diminish the urgency for mitigation given the high-value targets involved.

Mitigation Recommendations

1. Immediately disable support for legacy SSL/TLS protocols (e.g., SSL 2.0, SSL 3.0, TLS 1.0, TLS 1.1) on FAST/TOOLS web servers and related infrastructure to prevent use of weak cryptographic algorithms. 2. Monitor Yokogawa Electric Corporation's advisories closely and apply official patches or updates as soon as they become available. 3. Implement network segmentation and strict firewall rules to limit access to FAST/TOOLS management interfaces to trusted internal networks only. 4. Deploy intrusion detection/prevention systems (IDS/IPS) capable of detecting anomalous SSL/TLS traffic or attempts to exploit weak cryptographic protocols. 5. Conduct regular cryptographic audits and vulnerability assessments on industrial control systems to identify and remediate weak encryption usage. 6. Utilize VPNs or other secure tunneling mechanisms for remote access to FAST/TOOLS to add an additional layer of encryption and authentication. 7. Train operational technology (OT) security teams on the risks of legacy cryptographic protocols and ensure incident response plans include scenarios involving cryptographic vulnerabilities. 8. Review and update cryptographic policies to mandate the use of modern, secure TLS versions (TLS 1.2 or higher) and strong cipher suites across all industrial communication channels.

Pro Console: star threats, build custom feeds, automate alerts via Slack, email & webhooks.Upgrade to Pro

Technical Details

Data Version
5.2
Assigner Short Name
YokogawaGroup
Date Reserved
2025-12-05T05:04:18.582Z
Cvss Version
4.0
State
PUBLISHED

Threat ID: 698963134b57a58fa1213842

Added to database: 2/9/2026, 4:31:15 AM

Last enriched: 2/16/2026, 1:19:02 PM

Last updated: 3/26/2026, 7:46:47 AM

Views: 74

Community Reviews

0 reviews

Crowdsource mitigation strategies, share intel context, and vote on the most helpful responses. Sign in to add your voice and help keep defenders ahead.

Sort by
Loading community insights…

Want to contribute mitigation steps or threat intel context? Sign in or create an account to join the community discussion.

Actions

PRO

Updates to AI analysis require Pro Console access. Upgrade inside Console → Billing.

Please log in to the Console to use AI analysis features.

Need more coverage?

Upgrade to Pro Console for AI refresh and higher limits.

For incident response and remediation, OffSeq services can help resolve threats faster.

Latest Threats

Breach by OffSeqOFFSEQFRIENDS — 25% OFF

Check if your credentials are on the dark web

Instant breach scanning across billions of leaked records. Free tier available.

Scan now
OffSeq TrainingCredly Certified

Lead Pen Test Professional

Technical5-day eLearningPECB Accredited
View courses