Skip to main content
Press slash or control plus K to focus the search. Use the arrow keys to navigate results and press enter to open a threat.
Reconnecting to live updates…

CVE-2025-66603: CWE-358 in Yokogawa Electric Corporation FAST/TOOLS

0
Low
VulnerabilityCVE-2025-66603cvecve-2025-66603cwe-358
Published: Mon Feb 09 2026 (02/09/2026, 03:15:41 UTC)
Source: CVE Database V5
Vendor/Project: Yokogawa Electric Corporation
Product: FAST/TOOLS

Description

CVE-2025-66603 is a low-severity vulnerability in Yokogawa Electric Corporation's FAST/TOOLS software versions R9. 01 to R10. 04. The issue arises because the web server accepts the HTTP OPTIONS method, which can disclose information about supported HTTP methods. While this does not directly allow exploitation, it can aid attackers in reconnaissance and facilitate other attacks. The vulnerability does not require authentication but does require user interaction and has a high attack complexity, limiting its exploitability. There are no known exploits in the wild, and no patches have been released yet. European organizations using FAST/TOOLS in critical industrial control systems should be aware of this issue. Mitigations include restricting or disabling the OPTIONS method on the web server and monitoring for unusual HTTP requests. Countries with significant industrial automation sectors using Yokogawa products, such as Germany and the UK, may be more affected.

AI-Powered Analysis

AILast updated: 02/16/2026, 13:20:52 UTC

Technical Analysis

CVE-2025-66603 identifies a vulnerability in the FAST/TOOLS software suite by Yokogawa Electric Corporation, specifically affecting versions R9.01 through R10.04. The vulnerability is categorized under CWE-358, which relates to improper handling of HTTP methods. The core issue is that the embedded web server within FAST/TOOLS accepts the HTTP OPTIONS method. This method is typically used by clients to discover which HTTP methods are supported by the server. While the OPTIONS method itself is not inherently dangerous, its acceptance can reveal information that may assist attackers in crafting further attacks, such as cross-site scripting (XSS), cross-site request forgery (CSRF), or other HTTP method-based exploits. The CVSS 4.0 base score is 2.1, indicating low severity, with the vector showing network attack vector (AV:N), high attack complexity (AC:H), no privileges required (PR:N), user interaction required (UI:A), and low confidentiality impact (VC:L). The vulnerability does not impact integrity or availability. No known exploits exist in the wild, and no patches have been published yet. The vulnerability affects multiple FAST/TOOLS packages including RVSVRN, UNSVRN, HMIWEB, FTEES, and HMIMOB, which are components used in industrial automation and SCADA environments. Given the nature of the vulnerability, it primarily serves as an information disclosure or reconnaissance aid rather than a direct exploit vector.

Potential Impact

For European organizations, especially those operating critical infrastructure or industrial control systems using Yokogawa FAST/TOOLS, this vulnerability could provide attackers with additional information about the web server's capabilities. While the direct impact is low, the information gained could facilitate more sophisticated attacks targeting industrial environments. This is particularly relevant for sectors such as energy, manufacturing, and utilities, where Yokogawa products are commonly deployed. The acceptance of the OPTIONS method might allow attackers to map out attack surfaces or bypass certain security controls. However, since exploitation requires user interaction and has high complexity, the immediate risk is limited. Still, in environments with high-value targets or where defense-in-depth is critical, even low-severity vulnerabilities can be leveraged as part of multi-stage attacks. The lack of known exploits reduces urgency but does not eliminate the need for vigilance.

Mitigation Recommendations

To mitigate this vulnerability, organizations should consider the following specific actions: 1) Configure the FAST/TOOLS web server or any intermediate web servers and proxies to disable or restrict the HTTP OPTIONS method, allowing only necessary HTTP methods such as GET and POST. 2) Implement strict network segmentation and firewall rules to limit access to the FAST/TOOLS web interface to trusted hosts and networks only. 3) Monitor web server logs for unusual or unexpected HTTP OPTIONS requests that could indicate reconnaissance activity. 4) Employ web application firewalls (WAFs) capable of detecting and blocking suspicious HTTP methods or anomalous traffic patterns. 5) Maintain up-to-date inventories of Yokogawa FAST/TOOLS versions deployed and plan for timely patching once official fixes become available. 6) Conduct security awareness training for users to recognize and report suspicious activities that might involve social engineering or phishing, given the user interaction requirement. 7) Review and harden authentication and authorization mechanisms around the FAST/TOOLS web interface to reduce the risk of further exploitation.

Need more detailed analysis?Upgrade to Pro Console

Technical Details

Data Version
5.2
Assigner Short Name
YokogawaGroup
Date Reserved
2025-12-05T05:04:18.583Z
Cvss Version
4.0
State
PUBLISHED

Threat ID: 698955034b57a58fa1ffc95f

Added to database: 2/9/2026, 3:31:15 AM

Last enriched: 2/16/2026, 1:20:52 PM

Last updated: 2/21/2026, 12:23:20 AM

Views: 21

Community Reviews

0 reviews

Crowdsource mitigation strategies, share intel context, and vote on the most helpful responses. Sign in to add your voice and help keep defenders ahead.

Sort by
Loading community insights…

Want to contribute mitigation steps or threat intel context? Sign in or create an account to join the community discussion.

Actions

PRO

Updates to AI analysis require Pro Console access. Upgrade inside Console → Billing.

Please log in to the Console to use AI analysis features.

Need more coverage?

Upgrade to Pro Console in Console -> Billing for AI refresh and higher limits.

For incident response and remediation, OffSeq services can help resolve threats faster.

Latest Threats