Skip to main content
Press slash or control plus K to focus the search. Use the arrow keys to navigate results and press enter to open a threat.
Reconnecting to live updates…

CVE-2025-66602: CWE-291 in Yokogawa Electric Corporation FAST/TOOLS

0
Medium
VulnerabilityCVE-2025-66602cvecve-2025-66602cwe-291
Published: Mon Feb 09 2026 (02/09/2026, 03:16:47 UTC)
Source: CVE Database V5
Vendor/Project: Yokogawa Electric Corporation
Product: FAST/TOOLS

Description

CVE-2025-66602 is a medium-severity vulnerability in Yokogawa Electric Corporation's FAST/TOOLS SCADA system versions R9. 01 to R10. 04. The flaw arises because the web server accepts access by IP address without sufficient authentication, enabling potential unauthorized access. This weakness could be exploited by a worm that randomly scans IP addresses to intrude into networks running the affected FAST/TOOLS packages (RVSVRN, UNSVRN, HMIWEB, FTEES, HMIMOB). The vulnerability does not require user interaction or privileges and can be exploited remotely over the network, potentially compromising confidentiality. No known exploits are currently in the wild, and no patches have been published yet. European organizations using FAST/TOOLS in critical infrastructure sectors such as energy, manufacturing, or utilities may face increased risk, especially in countries with significant Yokogawa deployments. Mitigation should focus on network segmentation, restricting IP-based access, and monitoring for anomalous scanning activity. Given the critical role of FAST/TOOLS in industrial control, exploitation could disrupt operations or leak sensitive data, warranting proactive defense measures.

AI-Powered Analysis

AILast updated: 02/16/2026, 13:20:30 UTC

Technical Analysis

CVE-2025-66602 is a vulnerability classified under CWE-291 (Improper Authentication) found in Yokogawa Electric Corporation's FAST/TOOLS SCADA system, specifically affecting versions R9.01 through R10.04. The root cause is that the web server component of FAST/TOOLS accepts connections based solely on IP address without enforcing robust authentication mechanisms. This design flaw allows an unauthenticated attacker, potentially a worm that performs random IP address scanning, to gain unauthorized access to the system. The affected FAST/TOOLS packages include RVSVRN, UNSVRN, HMIWEB, FTEES, and HMIMOB, which are integral to the operation and monitoring of industrial processes. The vulnerability has a CVSS 4.0 base score of 6.9, indicating medium severity, with attack vector being network-based, no required privileges or user interaction, and low impact on confidentiality but no impact on integrity or availability. The lack of authentication combined with exposure to network scanning increases the risk of automated exploitation attempts. Although no exploits are currently known in the wild and no patches have been released, the vulnerability poses a significant risk to industrial control systems that rely on FAST/TOOLS for real-time monitoring and control. Attackers exploiting this flaw could gain unauthorized access to sensitive operational data or potentially manipulate system parameters if combined with other vulnerabilities or misconfigurations. The vulnerability highlights the importance of strong authentication and network access controls in industrial environments.

Potential Impact

For European organizations, particularly those operating critical infrastructure such as energy production, utilities, manufacturing, and chemical processing, this vulnerability could lead to unauthorized access to industrial control systems managed by FAST/TOOLS. Such access may compromise the confidentiality of operational data, potentially exposing sensitive process information or intellectual property. While the vulnerability does not directly affect system integrity or availability, unauthorized access could serve as a foothold for further attacks, including lateral movement or deployment of malware within industrial networks. The risk is heightened by the potential for automated worms to scan and exploit vulnerable systems, increasing the likelihood of widespread compromise. Disruption or data leakage in critical sectors could have cascading effects on supply chains and public safety. European organizations with insufficient network segmentation or exposed FAST/TOOLS web servers are particularly vulnerable. The medium severity rating suggests a moderate but non-negligible risk, emphasizing the need for timely mitigation to prevent exploitation.

Mitigation Recommendations

1. Implement strict network segmentation to isolate FAST/TOOLS systems from general IT and internet-facing networks, reducing exposure to random IP scanning worms. 2. Restrict access to FAST/TOOLS web servers by enforcing IP whitelisting and firewall rules that limit connections to trusted management networks only. 3. Deploy intrusion detection and prevention systems (IDS/IPS) to monitor for unusual scanning or access patterns targeting FAST/TOOLS IP addresses. 4. Enforce strong authentication mechanisms at the network perimeter and within the industrial control system environment, supplementing or replacing IP-based access controls. 5. Regularly audit and update FAST/TOOLS configurations to disable unnecessary services and ensure minimal exposure. 6. Maintain up-to-date asset inventories to quickly identify and isolate vulnerable FAST/TOOLS instances. 7. Engage with Yokogawa Electric Corporation for updates on patches or security advisories and plan for timely application once available. 8. Conduct employee training on recognizing and responding to potential intrusion attempts targeting industrial control systems. 9. Consider deploying network anomaly detection tools specialized for industrial protocols to detect early signs of exploitation attempts.

Need more detailed analysis?Upgrade to Pro Console

Technical Details

Data Version
5.2
Assigner Short Name
YokogawaGroup
Date Reserved
2025-12-05T05:04:18.583Z
Cvss Version
4.0
State
PUBLISHED

Threat ID: 698955034b57a58fa1ffc95c

Added to database: 2/9/2026, 3:31:15 AM

Last enriched: 2/16/2026, 1:20:30 PM

Last updated: 2/21/2026, 12:23:18 AM

Views: 29

Community Reviews

0 reviews

Crowdsource mitigation strategies, share intel context, and vote on the most helpful responses. Sign in to add your voice and help keep defenders ahead.

Sort by
Loading community insights…

Want to contribute mitigation steps or threat intel context? Sign in or create an account to join the community discussion.

Actions

PRO

Updates to AI analysis require Pro Console access. Upgrade inside Console → Billing.

Please log in to the Console to use AI analysis features.

Need more coverage?

Upgrade to Pro Console in Console -> Billing for AI refresh and higher limits.

For incident response and remediation, OffSeq services can help resolve threats faster.

Latest Threats