Skip to main content
Press slash or control plus K to focus the search. Use the arrow keys to navigate results and press enter to open a threat.
Reconnecting to live updates…

CVE-2025-66600: CWE-358 in Yokogawa Electric Corporation FAST/TOOLS

0
High
VulnerabilityCVE-2025-66600cvecve-2025-66600cwe-358
Published: Mon Feb 09 2026 (02/09/2026, 03:24:33 UTC)
Source: CVE Database V5
Vendor/Project: Yokogawa Electric Corporation
Product: FAST/TOOLS

Description

CVE-2025-66600 is a high-severity vulnerability in Yokogawa Electric Corporation's FAST/TOOLS software versions R9. 01 through R10. 04. The issue stems from the lack of HTTP Strict Transport Security (HSTS) configuration, which exposes communications to interception via man-in-the-middle (MITM) attacks. This vulnerability allows attackers to sniff sensitive data transmitted between clients and the web server. Exploitation requires no authentication or user interaction and can be performed remotely over the network. Although no known exploits are currently in the wild, the vulnerability poses a significant risk to confidentiality. European organizations using FAST/TOOLS in critical industrial control or SCADA environments could face data breaches or operational disruptions. Mitigation involves enabling HSTS on the web server, enforcing HTTPS connections, and monitoring network traffic for suspicious activity. Countries with substantial industrial automation sectors and Yokogawa customer bases, such as Germany, France, Italy, and the UK, are most likely to be affected.

AI-Powered Analysis

AILast updated: 02/16/2026, 13:19:56 UTC

Technical Analysis

CVE-2025-66600 identifies a security weakness in Yokogawa Electric Corporation's FAST/TOOLS software, specifically versions R9.01 through R10.04, which are used for industrial automation and control systems. The vulnerability is classified under CWE-358, indicating a failure to enforce HTTP Strict Transport Security (HSTS). HSTS is a web security policy mechanism that forces browsers to interact with servers only over secure HTTPS connections, preventing downgrade attacks and cookie hijacking. The absence of HSTS means that an attacker positioned as a man-in-the-middle (MITM) can intercept and sniff HTTP communications between clients and the FAST/TOOLS web server. This interception can lead to exposure of sensitive operational data or credentials transmitted in plaintext or over insecure channels. The CVSS 4.0 base score of 8.8 reflects the high severity, with attack vector being network-based, no required privileges or user interaction, and a high impact on confidentiality. The vulnerability affects multiple FAST/TOOLS packages including RVSVRN, UNSVRN, HMIWEB, FTEES, and HMIMOB, which are components typically involved in human-machine interface (HMI) and supervisory control. No patches or exploits are currently reported, but the risk remains significant due to the critical nature of the affected systems and the ease of exploitation. The vulnerability's exploitation could compromise the integrity of industrial control processes by leaking sensitive data or enabling further attacks.

Potential Impact

For European organizations, especially those operating critical infrastructure or industrial control systems using Yokogawa FAST/TOOLS, this vulnerability poses a substantial risk. The potential impact includes unauthorized disclosure of sensitive operational data, which could lead to industrial espionage, sabotage, or disruption of manufacturing and utility services. Confidentiality breaches could expose proprietary process information or credentials, facilitating further intrusions. Given the critical role of FAST/TOOLS in supervisory control and data acquisition (SCADA) environments, exploitation could indirectly affect system integrity and availability if attackers leverage intercepted data to launch subsequent attacks. The lack of authentication or user interaction required for exploitation increases the threat surface. European industries such as energy, manufacturing, and transportation that rely on Yokogawa solutions may face operational disruptions, regulatory compliance issues, and reputational damage if this vulnerability is exploited.

Mitigation Recommendations

To mitigate CVE-2025-66600, organizations should immediately configure HSTS on all FAST/TOOLS web servers to enforce HTTPS connections and prevent protocol downgrade attacks. This involves setting the Strict-Transport-Security HTTP header with an appropriate max-age directive and including subdomains if applicable. Network administrators should ensure that TLS is properly configured with strong cipher suites and certificates to secure communications. Regularly monitoring network traffic for signs of MITM attacks, such as unexpected certificate changes or anomalous traffic patterns, is recommended. Additionally, organizations should segment industrial control networks to limit exposure and restrict access to FAST/TOOLS interfaces. Applying any vendor-provided updates or patches once available is critical. Finally, conducting security awareness training for personnel and implementing intrusion detection systems tailored for industrial environments can help detect and respond to exploitation attempts.

Need more detailed analysis?Upgrade to Pro Console

Technical Details

Data Version
5.2
Assigner Short Name
YokogawaGroup
Date Reserved
2025-12-05T05:04:18.583Z
Cvss Version
4.0
State
PUBLISHED

Threat ID: 698955034b57a58fa1ffc956

Added to database: 2/9/2026, 3:31:15 AM

Last enriched: 2/16/2026, 1:19:56 PM

Last updated: 2/21/2026, 12:23:18 AM

Views: 33

Community Reviews

0 reviews

Crowdsource mitigation strategies, share intel context, and vote on the most helpful responses. Sign in to add your voice and help keep defenders ahead.

Sort by
Loading community insights…

Want to contribute mitigation steps or threat intel context? Sign in or create an account to join the community discussion.

Actions

PRO

Updates to AI analysis require Pro Console access. Upgrade inside Console → Billing.

Please log in to the Console to use AI analysis features.

Need more coverage?

Upgrade to Pro Console in Console -> Billing for AI refresh and higher limits.

For incident response and remediation, OffSeq services can help resolve threats faster.

Latest Threats