CVE-2025-66603: CWE-358 in Yokogawa Electric Corporation FAST/TOOLS
CVE-2025-66603 is a low-severity vulnerability in Yokogawa Electric Corporation's FAST/TOOLS software versions R9. 01 to R10. 04. The issue arises because the web server accepts the HTTP OPTIONS method, which can disclose information about supported HTTP methods. While this does not directly allow exploitation, it can aid attackers in reconnaissance and facilitate other attacks. The vulnerability does not require authentication but does require user interaction and has a high attack complexity, limiting its exploitability. There are no known exploits in the wild, and no patches have been released yet. European organizations using FAST/TOOLS in critical industrial control systems should be aware of this issue. Mitigations include restricting or disabling the OPTIONS method on the web server and monitoring for unusual HTTP requests. Countries with significant industrial automation sectors using Yokogawa products, such as Germany and the UK, may be more affected.
AI Analysis
Technical Summary
CVE-2025-66603 identifies a vulnerability in the FAST/TOOLS software suite by Yokogawa Electric Corporation, specifically affecting versions R9.01 through R10.04. The vulnerability is categorized under CWE-358, which relates to improper handling of HTTP methods. The core issue is that the embedded web server within FAST/TOOLS accepts the HTTP OPTIONS method. This method is typically used by clients to discover which HTTP methods are supported by the server. While the OPTIONS method itself is not inherently dangerous, its acceptance can reveal information that may assist attackers in crafting further attacks, such as cross-site scripting (XSS), cross-site request forgery (CSRF), or other HTTP method-based exploits. The CVSS 4.0 base score is 2.1, indicating low severity, with the vector showing network attack vector (AV:N), high attack complexity (AC:H), no privileges required (PR:N), user interaction required (UI:A), and low confidentiality impact (VC:L). The vulnerability does not impact integrity or availability. No known exploits exist in the wild, and no patches have been published yet. The vulnerability affects multiple FAST/TOOLS packages including RVSVRN, UNSVRN, HMIWEB, FTEES, and HMIMOB, which are components used in industrial automation and SCADA environments. Given the nature of the vulnerability, it primarily serves as an information disclosure or reconnaissance aid rather than a direct exploit vector.
Potential Impact
For European organizations, especially those operating critical infrastructure or industrial control systems using Yokogawa FAST/TOOLS, this vulnerability could provide attackers with additional information about the web server's capabilities. While the direct impact is low, the information gained could facilitate more sophisticated attacks targeting industrial environments. This is particularly relevant for sectors such as energy, manufacturing, and utilities, where Yokogawa products are commonly deployed. The acceptance of the OPTIONS method might allow attackers to map out attack surfaces or bypass certain security controls. However, since exploitation requires user interaction and has high complexity, the immediate risk is limited. Still, in environments with high-value targets or where defense-in-depth is critical, even low-severity vulnerabilities can be leveraged as part of multi-stage attacks. The lack of known exploits reduces urgency but does not eliminate the need for vigilance.
Mitigation Recommendations
To mitigate this vulnerability, organizations should consider the following specific actions: 1) Configure the FAST/TOOLS web server or any intermediate web servers and proxies to disable or restrict the HTTP OPTIONS method, allowing only necessary HTTP methods such as GET and POST. 2) Implement strict network segmentation and firewall rules to limit access to the FAST/TOOLS web interface to trusted hosts and networks only. 3) Monitor web server logs for unusual or unexpected HTTP OPTIONS requests that could indicate reconnaissance activity. 4) Employ web application firewalls (WAFs) capable of detecting and blocking suspicious HTTP methods or anomalous traffic patterns. 5) Maintain up-to-date inventories of Yokogawa FAST/TOOLS versions deployed and plan for timely patching once official fixes become available. 6) Conduct security awareness training for users to recognize and report suspicious activities that might involve social engineering or phishing, given the user interaction requirement. 7) Review and harden authentication and authorization mechanisms around the FAST/TOOLS web interface to reduce the risk of further exploitation.
Affected Countries
Germany, United Kingdom, France, Italy, Netherlands, Belgium, Sweden
CVE-2025-66603: CWE-358 in Yokogawa Electric Corporation FAST/TOOLS
Description
CVE-2025-66603 is a low-severity vulnerability in Yokogawa Electric Corporation's FAST/TOOLS software versions R9. 01 to R10. 04. The issue arises because the web server accepts the HTTP OPTIONS method, which can disclose information about supported HTTP methods. While this does not directly allow exploitation, it can aid attackers in reconnaissance and facilitate other attacks. The vulnerability does not require authentication but does require user interaction and has a high attack complexity, limiting its exploitability. There are no known exploits in the wild, and no patches have been released yet. European organizations using FAST/TOOLS in critical industrial control systems should be aware of this issue. Mitigations include restricting or disabling the OPTIONS method on the web server and monitoring for unusual HTTP requests. Countries with significant industrial automation sectors using Yokogawa products, such as Germany and the UK, may be more affected.
AI-Powered Analysis
Technical Analysis
CVE-2025-66603 identifies a vulnerability in the FAST/TOOLS software suite by Yokogawa Electric Corporation, specifically affecting versions R9.01 through R10.04. The vulnerability is categorized under CWE-358, which relates to improper handling of HTTP methods. The core issue is that the embedded web server within FAST/TOOLS accepts the HTTP OPTIONS method. This method is typically used by clients to discover which HTTP methods are supported by the server. While the OPTIONS method itself is not inherently dangerous, its acceptance can reveal information that may assist attackers in crafting further attacks, such as cross-site scripting (XSS), cross-site request forgery (CSRF), or other HTTP method-based exploits. The CVSS 4.0 base score is 2.1, indicating low severity, with the vector showing network attack vector (AV:N), high attack complexity (AC:H), no privileges required (PR:N), user interaction required (UI:A), and low confidentiality impact (VC:L). The vulnerability does not impact integrity or availability. No known exploits exist in the wild, and no patches have been published yet. The vulnerability affects multiple FAST/TOOLS packages including RVSVRN, UNSVRN, HMIWEB, FTEES, and HMIMOB, which are components used in industrial automation and SCADA environments. Given the nature of the vulnerability, it primarily serves as an information disclosure or reconnaissance aid rather than a direct exploit vector.
Potential Impact
For European organizations, especially those operating critical infrastructure or industrial control systems using Yokogawa FAST/TOOLS, this vulnerability could provide attackers with additional information about the web server's capabilities. While the direct impact is low, the information gained could facilitate more sophisticated attacks targeting industrial environments. This is particularly relevant for sectors such as energy, manufacturing, and utilities, where Yokogawa products are commonly deployed. The acceptance of the OPTIONS method might allow attackers to map out attack surfaces or bypass certain security controls. However, since exploitation requires user interaction and has high complexity, the immediate risk is limited. Still, in environments with high-value targets or where defense-in-depth is critical, even low-severity vulnerabilities can be leveraged as part of multi-stage attacks. The lack of known exploits reduces urgency but does not eliminate the need for vigilance.
Mitigation Recommendations
To mitigate this vulnerability, organizations should consider the following specific actions: 1) Configure the FAST/TOOLS web server or any intermediate web servers and proxies to disable or restrict the HTTP OPTIONS method, allowing only necessary HTTP methods such as GET and POST. 2) Implement strict network segmentation and firewall rules to limit access to the FAST/TOOLS web interface to trusted hosts and networks only. 3) Monitor web server logs for unusual or unexpected HTTP OPTIONS requests that could indicate reconnaissance activity. 4) Employ web application firewalls (WAFs) capable of detecting and blocking suspicious HTTP methods or anomalous traffic patterns. 5) Maintain up-to-date inventories of Yokogawa FAST/TOOLS versions deployed and plan for timely patching once official fixes become available. 6) Conduct security awareness training for users to recognize and report suspicious activities that might involve social engineering or phishing, given the user interaction requirement. 7) Review and harden authentication and authorization mechanisms around the FAST/TOOLS web interface to reduce the risk of further exploitation.
Affected Countries
Technical Details
- Data Version
- 5.2
- Assigner Short Name
- YokogawaGroup
- Date Reserved
- 2025-12-05T05:04:18.583Z
- Cvss Version
- 4.0
- State
- PUBLISHED
Threat ID: 698955034b57a58fa1ffc95f
Added to database: 2/9/2026, 3:31:15 AM
Last enriched: 2/16/2026, 1:20:52 PM
Last updated: 2/21/2026, 12:23:20 AM
Views: 21
Community Reviews
0 reviewsCrowdsource mitigation strategies, share intel context, and vote on the most helpful responses. Sign in to add your voice and help keep defenders ahead.
Want to contribute mitigation steps or threat intel context? Sign in or create an account to join the community discussion.
Related Threats
CVE-2026-27203: CWE-15: External Control of System or Configuration Setting in YosefHayim ebay-mcp
HighCVE-2026-27168: CWE-122: Heap-based Buffer Overflow in HappySeaFox sail
HighCVE-2026-27134: CWE-287: Improper Authentication in strimzi strimzi-kafka-operator
HighCVE-2026-27190: CWE-78: Improper Neutralization of Special Elements used in an OS Command ('OS Command Injection') in denoland deno
HighCVE-2026-27026: CWE-770: Allocation of Resources Without Limits or Throttling in py-pdf pypdf
MediumActions
Updates to AI analysis require Pro Console access. Upgrade inside Console → Billing.
External Links
Need more coverage?
Upgrade to Pro Console in Console -> Billing for AI refresh and higher limits.
For incident response and remediation, OffSeq services can help resolve threats faster.