CVE-2025-66604: CWE-319 Cleartext Transmission of Sensitive Information in Yokogawa Electric Corporation FAST/TOOLS
CVE-2025-66604 is a low-severity vulnerability in Yokogawa Electric Corporation's FAST/TOOLS software versions R9. 01 to R10. 04. The flaw involves the cleartext transmission of sensitive information, specifically the exposure of the library version on web pages. This information disclosure could aid attackers in crafting further attacks. The vulnerability requires user interaction and has a high attack complexity, limiting ease of exploitation. No known exploits are currently reported in the wild. The impact on confidentiality is low, and there is no direct effect on integrity or availability. European organizations using FAST/TOOLS in critical industrial control systems should be aware but face limited immediate risk. Mitigation involves restricting access to version information, applying secure communication protocols, and monitoring for suspicious activity.
AI Analysis
Technical Summary
CVE-2025-66604 identifies a vulnerability in Yokogawa Electric Corporation's FAST/TOOLS software suite, versions R9.01 through R10.04, which are used in industrial automation and control systems. The vulnerability is categorized under CWE-319, indicating cleartext transmission of sensitive information. Specifically, the software's web interface exposes the library version information openly on web pages. This exposure can be leveraged by attackers to gain intelligence about the software environment, potentially facilitating targeted attacks such as exploiting known vulnerabilities in specific library versions or crafting social engineering attacks. The CVSS 4.0 base score is 2.1, reflecting a low severity due to factors including network attack vector, high attack complexity, partial user interaction, and low confidentiality impact. The vulnerability does not affect integrity or availability and does not require privileges or authentication. No patches or exploits are currently documented, but the information disclosure could be a reconnaissance step in multi-stage attacks. Given the critical nature of industrial control systems where FAST/TOOLS is deployed, even low-severity vulnerabilities warrant attention to prevent escalation. The vulnerability highlights the importance of securing web interfaces and minimizing information leakage in operational technology environments.
Potential Impact
For European organizations, especially those operating critical infrastructure and industrial control systems using Yokogawa FAST/TOOLS, this vulnerability poses a limited but non-negligible risk. The disclosure of library version information can aid attackers in reconnaissance, increasing the likelihood of successful targeted attacks if other vulnerabilities exist. While the direct impact on confidentiality is low and there is no immediate threat to system integrity or availability, the vulnerability could be exploited as part of a broader attack chain. This is particularly relevant for sectors such as energy, manufacturing, and utilities, where Yokogawa products are commonly deployed. The exposure could lead to increased risk of cyber espionage or sabotage attempts. However, the high attack complexity and requirement for user interaction reduce the immediacy of the threat. Organizations with stringent network segmentation and monitoring may further mitigate risk. Nonetheless, awareness and proactive mitigation are important to maintain operational security and prevent potential escalation.
Mitigation Recommendations
To mitigate CVE-2025-66604, European organizations should implement the following specific measures: 1) Restrict access to FAST/TOOLS web interfaces to trusted networks and users only, employing network segmentation and firewall rules to limit exposure. 2) Configure web servers and applications to suppress or obfuscate version information and other sensitive metadata in HTTP responses and web pages. 3) Enforce the use of encrypted communication protocols such as HTTPS with strong TLS configurations to prevent interception of transmitted data. 4) Conduct regular security audits and vulnerability assessments focusing on information leakage and web interface security. 5) Monitor network traffic and logs for unusual access patterns or reconnaissance activity targeting FAST/TOOLS components. 6) Engage with Yokogawa Electric Corporation for updates or patches addressing this vulnerability and apply them promptly when available. 7) Train operational technology personnel on secure configuration practices and the risks of information disclosure. These targeted actions go beyond generic advice by focusing on reducing information exposure and strengthening perimeter defenses specific to industrial control systems.
Affected Countries
Germany, United Kingdom, France, Italy, Netherlands, Belgium, Sweden
CVE-2025-66604: CWE-319 Cleartext Transmission of Sensitive Information in Yokogawa Electric Corporation FAST/TOOLS
Description
CVE-2025-66604 is a low-severity vulnerability in Yokogawa Electric Corporation's FAST/TOOLS software versions R9. 01 to R10. 04. The flaw involves the cleartext transmission of sensitive information, specifically the exposure of the library version on web pages. This information disclosure could aid attackers in crafting further attacks. The vulnerability requires user interaction and has a high attack complexity, limiting ease of exploitation. No known exploits are currently reported in the wild. The impact on confidentiality is low, and there is no direct effect on integrity or availability. European organizations using FAST/TOOLS in critical industrial control systems should be aware but face limited immediate risk. Mitigation involves restricting access to version information, applying secure communication protocols, and monitoring for suspicious activity.
AI-Powered Analysis
Technical Analysis
CVE-2025-66604 identifies a vulnerability in Yokogawa Electric Corporation's FAST/TOOLS software suite, versions R9.01 through R10.04, which are used in industrial automation and control systems. The vulnerability is categorized under CWE-319, indicating cleartext transmission of sensitive information. Specifically, the software's web interface exposes the library version information openly on web pages. This exposure can be leveraged by attackers to gain intelligence about the software environment, potentially facilitating targeted attacks such as exploiting known vulnerabilities in specific library versions or crafting social engineering attacks. The CVSS 4.0 base score is 2.1, reflecting a low severity due to factors including network attack vector, high attack complexity, partial user interaction, and low confidentiality impact. The vulnerability does not affect integrity or availability and does not require privileges or authentication. No patches or exploits are currently documented, but the information disclosure could be a reconnaissance step in multi-stage attacks. Given the critical nature of industrial control systems where FAST/TOOLS is deployed, even low-severity vulnerabilities warrant attention to prevent escalation. The vulnerability highlights the importance of securing web interfaces and minimizing information leakage in operational technology environments.
Potential Impact
For European organizations, especially those operating critical infrastructure and industrial control systems using Yokogawa FAST/TOOLS, this vulnerability poses a limited but non-negligible risk. The disclosure of library version information can aid attackers in reconnaissance, increasing the likelihood of successful targeted attacks if other vulnerabilities exist. While the direct impact on confidentiality is low and there is no immediate threat to system integrity or availability, the vulnerability could be exploited as part of a broader attack chain. This is particularly relevant for sectors such as energy, manufacturing, and utilities, where Yokogawa products are commonly deployed. The exposure could lead to increased risk of cyber espionage or sabotage attempts. However, the high attack complexity and requirement for user interaction reduce the immediacy of the threat. Organizations with stringent network segmentation and monitoring may further mitigate risk. Nonetheless, awareness and proactive mitigation are important to maintain operational security and prevent potential escalation.
Mitigation Recommendations
To mitigate CVE-2025-66604, European organizations should implement the following specific measures: 1) Restrict access to FAST/TOOLS web interfaces to trusted networks and users only, employing network segmentation and firewall rules to limit exposure. 2) Configure web servers and applications to suppress or obfuscate version information and other sensitive metadata in HTTP responses and web pages. 3) Enforce the use of encrypted communication protocols such as HTTPS with strong TLS configurations to prevent interception of transmitted data. 4) Conduct regular security audits and vulnerability assessments focusing on information leakage and web interface security. 5) Monitor network traffic and logs for unusual access patterns or reconnaissance activity targeting FAST/TOOLS components. 6) Engage with Yokogawa Electric Corporation for updates or patches addressing this vulnerability and apply them promptly when available. 7) Train operational technology personnel on secure configuration practices and the risks of information disclosure. These targeted actions go beyond generic advice by focusing on reducing information exposure and strengthening perimeter defenses specific to industrial control systems.
Affected Countries
Technical Details
- Data Version
- 5.2
- Assigner Short Name
- YokogawaGroup
- Date Reserved
- 2025-12-05T05:04:40.512Z
- Cvss Version
- 4.0
- State
- PUBLISHED
Threat ID: 698955034b57a58fa1ffc962
Added to database: 2/9/2026, 3:31:15 AM
Last enriched: 2/16/2026, 1:21:10 PM
Last updated: 2/21/2026, 12:22:01 AM
Views: 68
Community Reviews
0 reviewsCrowdsource mitigation strategies, share intel context, and vote on the most helpful responses. Sign in to add your voice and help keep defenders ahead.
Want to contribute mitigation steps or threat intel context? Sign in or create an account to join the community discussion.
Related Threats
CVE-2026-27203: CWE-15: External Control of System or Configuration Setting in YosefHayim ebay-mcp
HighCVE-2026-27168: CWE-122: Heap-based Buffer Overflow in HappySeaFox sail
HighCVE-2026-27134: CWE-287: Improper Authentication in strimzi strimzi-kafka-operator
HighCVE-2026-27190: CWE-78: Improper Neutralization of Special Elements used in an OS Command ('OS Command Injection') in denoland deno
HighCVE-2026-27026: CWE-770: Allocation of Resources Without Limits or Throttling in py-pdf pypdf
MediumActions
Updates to AI analysis require Pro Console access. Upgrade inside Console → Billing.
External Links
Need more coverage?
Upgrade to Pro Console in Console -> Billing for AI refresh and higher limits.
For incident response and remediation, OffSeq services can help resolve threats faster.