CVE-2025-66600: CWE-358 in Yokogawa Electric Corporation FAST/TOOLS
CVE-2025-66600 is a high-severity vulnerability in Yokogawa Electric Corporation's FAST/TOOLS software versions R9. 01 through R10. 04. The issue stems from the lack of HTTP Strict Transport Security (HSTS) configuration, which exposes communications to interception via man-in-the-middle (MITM) attacks. This vulnerability allows attackers to sniff sensitive data transmitted between clients and the web server. Exploitation requires no authentication or user interaction and can be performed remotely over the network. Although no known exploits are currently in the wild, the vulnerability poses a significant risk to confidentiality. European organizations using FAST/TOOLS in critical industrial control or SCADA environments could face data breaches or operational disruptions. Mitigation involves enabling HSTS on the web server, enforcing HTTPS connections, and monitoring network traffic for suspicious activity. Countries with substantial industrial automation sectors and Yokogawa customer bases, such as Germany, France, Italy, and the UK, are most likely to be affected.
AI Analysis
Technical Summary
CVE-2025-66600 identifies a security weakness in Yokogawa Electric Corporation's FAST/TOOLS software, specifically versions R9.01 through R10.04, which are used for industrial automation and control systems. The vulnerability is classified under CWE-358, indicating a failure to enforce HTTP Strict Transport Security (HSTS). HSTS is a web security policy mechanism that forces browsers to interact with servers only over secure HTTPS connections, preventing downgrade attacks and cookie hijacking. The absence of HSTS means that an attacker positioned as a man-in-the-middle (MITM) can intercept and sniff HTTP communications between clients and the FAST/TOOLS web server. This interception can lead to exposure of sensitive operational data or credentials transmitted in plaintext or over insecure channels. The CVSS 4.0 base score of 8.8 reflects the high severity, with attack vector being network-based, no required privileges or user interaction, and a high impact on confidentiality. The vulnerability affects multiple FAST/TOOLS packages including RVSVRN, UNSVRN, HMIWEB, FTEES, and HMIMOB, which are components typically involved in human-machine interface (HMI) and supervisory control. No patches or exploits are currently reported, but the risk remains significant due to the critical nature of the affected systems and the ease of exploitation. The vulnerability's exploitation could compromise the integrity of industrial control processes by leaking sensitive data or enabling further attacks.
Potential Impact
For European organizations, especially those operating critical infrastructure or industrial control systems using Yokogawa FAST/TOOLS, this vulnerability poses a substantial risk. The potential impact includes unauthorized disclosure of sensitive operational data, which could lead to industrial espionage, sabotage, or disruption of manufacturing and utility services. Confidentiality breaches could expose proprietary process information or credentials, facilitating further intrusions. Given the critical role of FAST/TOOLS in supervisory control and data acquisition (SCADA) environments, exploitation could indirectly affect system integrity and availability if attackers leverage intercepted data to launch subsequent attacks. The lack of authentication or user interaction required for exploitation increases the threat surface. European industries such as energy, manufacturing, and transportation that rely on Yokogawa solutions may face operational disruptions, regulatory compliance issues, and reputational damage if this vulnerability is exploited.
Mitigation Recommendations
To mitigate CVE-2025-66600, organizations should immediately configure HSTS on all FAST/TOOLS web servers to enforce HTTPS connections and prevent protocol downgrade attacks. This involves setting the Strict-Transport-Security HTTP header with an appropriate max-age directive and including subdomains if applicable. Network administrators should ensure that TLS is properly configured with strong cipher suites and certificates to secure communications. Regularly monitoring network traffic for signs of MITM attacks, such as unexpected certificate changes or anomalous traffic patterns, is recommended. Additionally, organizations should segment industrial control networks to limit exposure and restrict access to FAST/TOOLS interfaces. Applying any vendor-provided updates or patches once available is critical. Finally, conducting security awareness training for personnel and implementing intrusion detection systems tailored for industrial environments can help detect and respond to exploitation attempts.
Affected Countries
Germany, France, Italy, United Kingdom, Netherlands, Belgium, Sweden
CVE-2025-66600: CWE-358 in Yokogawa Electric Corporation FAST/TOOLS
Description
CVE-2025-66600 is a high-severity vulnerability in Yokogawa Electric Corporation's FAST/TOOLS software versions R9. 01 through R10. 04. The issue stems from the lack of HTTP Strict Transport Security (HSTS) configuration, which exposes communications to interception via man-in-the-middle (MITM) attacks. This vulnerability allows attackers to sniff sensitive data transmitted between clients and the web server. Exploitation requires no authentication or user interaction and can be performed remotely over the network. Although no known exploits are currently in the wild, the vulnerability poses a significant risk to confidentiality. European organizations using FAST/TOOLS in critical industrial control or SCADA environments could face data breaches or operational disruptions. Mitigation involves enabling HSTS on the web server, enforcing HTTPS connections, and monitoring network traffic for suspicious activity. Countries with substantial industrial automation sectors and Yokogawa customer bases, such as Germany, France, Italy, and the UK, are most likely to be affected.
AI-Powered Analysis
Technical Analysis
CVE-2025-66600 identifies a security weakness in Yokogawa Electric Corporation's FAST/TOOLS software, specifically versions R9.01 through R10.04, which are used for industrial automation and control systems. The vulnerability is classified under CWE-358, indicating a failure to enforce HTTP Strict Transport Security (HSTS). HSTS is a web security policy mechanism that forces browsers to interact with servers only over secure HTTPS connections, preventing downgrade attacks and cookie hijacking. The absence of HSTS means that an attacker positioned as a man-in-the-middle (MITM) can intercept and sniff HTTP communications between clients and the FAST/TOOLS web server. This interception can lead to exposure of sensitive operational data or credentials transmitted in plaintext or over insecure channels. The CVSS 4.0 base score of 8.8 reflects the high severity, with attack vector being network-based, no required privileges or user interaction, and a high impact on confidentiality. The vulnerability affects multiple FAST/TOOLS packages including RVSVRN, UNSVRN, HMIWEB, FTEES, and HMIMOB, which are components typically involved in human-machine interface (HMI) and supervisory control. No patches or exploits are currently reported, but the risk remains significant due to the critical nature of the affected systems and the ease of exploitation. The vulnerability's exploitation could compromise the integrity of industrial control processes by leaking sensitive data or enabling further attacks.
Potential Impact
For European organizations, especially those operating critical infrastructure or industrial control systems using Yokogawa FAST/TOOLS, this vulnerability poses a substantial risk. The potential impact includes unauthorized disclosure of sensitive operational data, which could lead to industrial espionage, sabotage, or disruption of manufacturing and utility services. Confidentiality breaches could expose proprietary process information or credentials, facilitating further intrusions. Given the critical role of FAST/TOOLS in supervisory control and data acquisition (SCADA) environments, exploitation could indirectly affect system integrity and availability if attackers leverage intercepted data to launch subsequent attacks. The lack of authentication or user interaction required for exploitation increases the threat surface. European industries such as energy, manufacturing, and transportation that rely on Yokogawa solutions may face operational disruptions, regulatory compliance issues, and reputational damage if this vulnerability is exploited.
Mitigation Recommendations
To mitigate CVE-2025-66600, organizations should immediately configure HSTS on all FAST/TOOLS web servers to enforce HTTPS connections and prevent protocol downgrade attacks. This involves setting the Strict-Transport-Security HTTP header with an appropriate max-age directive and including subdomains if applicable. Network administrators should ensure that TLS is properly configured with strong cipher suites and certificates to secure communications. Regularly monitoring network traffic for signs of MITM attacks, such as unexpected certificate changes or anomalous traffic patterns, is recommended. Additionally, organizations should segment industrial control networks to limit exposure and restrict access to FAST/TOOLS interfaces. Applying any vendor-provided updates or patches once available is critical. Finally, conducting security awareness training for personnel and implementing intrusion detection systems tailored for industrial environments can help detect and respond to exploitation attempts.
Affected Countries
Technical Details
- Data Version
- 5.2
- Assigner Short Name
- YokogawaGroup
- Date Reserved
- 2025-12-05T05:04:18.583Z
- Cvss Version
- 4.0
- State
- PUBLISHED
Threat ID: 698955034b57a58fa1ffc956
Added to database: 2/9/2026, 3:31:15 AM
Last enriched: 2/16/2026, 1:19:56 PM
Last updated: 2/21/2026, 12:23:18 AM
Views: 33
Community Reviews
0 reviewsCrowdsource mitigation strategies, share intel context, and vote on the most helpful responses. Sign in to add your voice and help keep defenders ahead.
Want to contribute mitigation steps or threat intel context? Sign in or create an account to join the community discussion.
Related Threats
CVE-2026-27203: CWE-15: External Control of System or Configuration Setting in YosefHayim ebay-mcp
HighCVE-2026-27168: CWE-122: Heap-based Buffer Overflow in HappySeaFox sail
HighCVE-2026-27134: CWE-287: Improper Authentication in strimzi strimzi-kafka-operator
HighCVE-2026-27190: CWE-78: Improper Neutralization of Special Elements used in an OS Command ('OS Command Injection') in denoland deno
HighCVE-2026-27026: CWE-770: Allocation of Resources Without Limits or Throttling in py-pdf pypdf
MediumActions
Updates to AI analysis require Pro Console access. Upgrade inside Console → Billing.
External Links
Need more coverage?
Upgrade to Pro Console in Console -> Billing for AI refresh and higher limits.
For incident response and remediation, OffSeq services can help resolve threats faster.