CVE-2025-66605: CWE-359 in Yokogawa Electric Corporation FAST/TOOLS
CVE-2025-66605 is a low-severity vulnerability in Yokogawa Electric Corporation's FAST/TOOLS software versions R9. 01 to R10. 04. The issue arises because certain input fields on the web interface have the autocomplete attribute enabled, causing sensitive input data to be stored in the user's browser. This behavior can lead to unintended data exposure if the browser's stored data is accessed by unauthorized parties. The vulnerability does not require authentication but does require user interaction, and it has a low impact on confidentiality with no impact on integrity or availability. No known exploits are currently in the wild, and no patches have been released yet. European organizations using FAST/TOOLS, especially in critical infrastructure sectors, should be aware of this risk and take steps to mitigate potential data leakage through browser autocomplete features.
AI Analysis
Technical Summary
CVE-2025-66605 is a vulnerability classified under CWE-359 (Exposure of Private Information Through Browser Caching) affecting Yokogawa Electric Corporation's FAST/TOOLS software packages including RVSVRN, UNSVRN, HMIWEB, FTEES, and HMIMOB versions R9.01 through R10.04. The core of the vulnerability lies in the web interface's input fields having the HTML autocomplete attribute enabled. This attribute causes browsers to store entered data locally to facilitate autofill in future sessions. While convenient, this behavior can inadvertently expose sensitive information if the browser's stored data is accessed by unauthorized users or malware on the client machine. The vulnerability does not require any authentication to exploit but does require user interaction, such as entering data into the affected input fields. The CVSS 4.0 score is 2.1, indicating low severity, with network attack vector, high attack complexity, no privileges required, user interaction needed, and low confidentiality impact. There is no impact on integrity or availability. No patches or fixes have been published at the time of disclosure, and no known exploits have been reported in the wild. This vulnerability primarily risks confidentiality through local data exposure rather than remote compromise or system disruption.
Potential Impact
For European organizations, particularly those in critical infrastructure sectors such as energy, manufacturing, and utilities where Yokogawa's FAST/TOOLS is commonly deployed, this vulnerability poses a risk of sensitive operational data being inadvertently stored in user browsers. If an attacker gains access to a user's workstation or browser profile, they could retrieve this cached data, potentially exposing operational parameters or credentials entered into the system. Although the impact on system integrity and availability is negligible, the confidentiality breach could facilitate further targeted attacks or insider threats. The risk is heightened in environments where endpoint security is weak or where shared workstations are used. However, the overall impact is limited by the requirement for user interaction and the need for local access to the browser data. Since no remote exploitation is possible without user involvement, the threat is primarily to endpoint security and data privacy rather than direct system compromise.
Mitigation Recommendations
European organizations should implement specific mitigations beyond generic advice: 1) Disable the autocomplete attribute on all input fields within FAST/TOOLS web interfaces by configuring or customizing the application if possible, or request this from Yokogawa through support channels. 2) Enforce strict endpoint security policies including browser profile protection, disk encryption, and regular clearing of browser cache and autofill data to minimize risk of local data exposure. 3) Educate users about the risks of storing sensitive information in browser autofill and encourage use of dedicated secure password managers instead. 4) Monitor and restrict physical and remote access to user workstations to prevent unauthorized access to stored browser data. 5) Apply network segmentation and access controls to limit exposure of FAST/TOOLS interfaces to trusted users only. 6) Stay alert for vendor patches or updates addressing this vulnerability and apply them promptly once available. 7) Consider deploying browser security extensions or enterprise policies that disable autofill features for critical applications. These targeted measures will reduce the risk of sensitive data leakage through browser caching in the context of this vulnerability.
Affected Countries
Germany, France, United Kingdom, Italy, Spain, Netherlands, Belgium, Sweden, Poland, Czech Republic
CVE-2025-66605: CWE-359 in Yokogawa Electric Corporation FAST/TOOLS
Description
CVE-2025-66605 is a low-severity vulnerability in Yokogawa Electric Corporation's FAST/TOOLS software versions R9. 01 to R10. 04. The issue arises because certain input fields on the web interface have the autocomplete attribute enabled, causing sensitive input data to be stored in the user's browser. This behavior can lead to unintended data exposure if the browser's stored data is accessed by unauthorized parties. The vulnerability does not require authentication but does require user interaction, and it has a low impact on confidentiality with no impact on integrity or availability. No known exploits are currently in the wild, and no patches have been released yet. European organizations using FAST/TOOLS, especially in critical infrastructure sectors, should be aware of this risk and take steps to mitigate potential data leakage through browser autocomplete features.
AI-Powered Analysis
Technical Analysis
CVE-2025-66605 is a vulnerability classified under CWE-359 (Exposure of Private Information Through Browser Caching) affecting Yokogawa Electric Corporation's FAST/TOOLS software packages including RVSVRN, UNSVRN, HMIWEB, FTEES, and HMIMOB versions R9.01 through R10.04. The core of the vulnerability lies in the web interface's input fields having the HTML autocomplete attribute enabled. This attribute causes browsers to store entered data locally to facilitate autofill in future sessions. While convenient, this behavior can inadvertently expose sensitive information if the browser's stored data is accessed by unauthorized users or malware on the client machine. The vulnerability does not require any authentication to exploit but does require user interaction, such as entering data into the affected input fields. The CVSS 4.0 score is 2.1, indicating low severity, with network attack vector, high attack complexity, no privileges required, user interaction needed, and low confidentiality impact. There is no impact on integrity or availability. No patches or fixes have been published at the time of disclosure, and no known exploits have been reported in the wild. This vulnerability primarily risks confidentiality through local data exposure rather than remote compromise or system disruption.
Potential Impact
For European organizations, particularly those in critical infrastructure sectors such as energy, manufacturing, and utilities where Yokogawa's FAST/TOOLS is commonly deployed, this vulnerability poses a risk of sensitive operational data being inadvertently stored in user browsers. If an attacker gains access to a user's workstation or browser profile, they could retrieve this cached data, potentially exposing operational parameters or credentials entered into the system. Although the impact on system integrity and availability is negligible, the confidentiality breach could facilitate further targeted attacks or insider threats. The risk is heightened in environments where endpoint security is weak or where shared workstations are used. However, the overall impact is limited by the requirement for user interaction and the need for local access to the browser data. Since no remote exploitation is possible without user involvement, the threat is primarily to endpoint security and data privacy rather than direct system compromise.
Mitigation Recommendations
European organizations should implement specific mitigations beyond generic advice: 1) Disable the autocomplete attribute on all input fields within FAST/TOOLS web interfaces by configuring or customizing the application if possible, or request this from Yokogawa through support channels. 2) Enforce strict endpoint security policies including browser profile protection, disk encryption, and regular clearing of browser cache and autofill data to minimize risk of local data exposure. 3) Educate users about the risks of storing sensitive information in browser autofill and encourage use of dedicated secure password managers instead. 4) Monitor and restrict physical and remote access to user workstations to prevent unauthorized access to stored browser data. 5) Apply network segmentation and access controls to limit exposure of FAST/TOOLS interfaces to trusted users only. 6) Stay alert for vendor patches or updates addressing this vulnerability and apply them promptly once available. 7) Consider deploying browser security extensions or enterprise policies that disable autofill features for critical applications. These targeted measures will reduce the risk of sensitive data leakage through browser caching in the context of this vulnerability.
Technical Details
- Data Version
- 5.2
- Assigner Short Name
- YokogawaGroup
- Date Reserved
- 2025-12-05T05:04:40.514Z
- Cvss Version
- 4.0
- State
- PUBLISHED
Threat ID: 698955034b57a58fa1ffc965
Added to database: 2/9/2026, 3:31:15 AM
Last enriched: 2/16/2026, 1:21:30 PM
Last updated: 2/21/2026, 12:23:18 AM
Views: 52
Community Reviews
0 reviewsCrowdsource mitigation strategies, share intel context, and vote on the most helpful responses. Sign in to add your voice and help keep defenders ahead.
Want to contribute mitigation steps or threat intel context? Sign in or create an account to join the community discussion.
Related Threats
CVE-2026-27203: CWE-15: External Control of System or Configuration Setting in YosefHayim ebay-mcp
HighCVE-2026-27168: CWE-122: Heap-based Buffer Overflow in HappySeaFox sail
HighCVE-2026-27134: CWE-287: Improper Authentication in strimzi strimzi-kafka-operator
HighCVE-2026-27190: CWE-78: Improper Neutralization of Special Elements used in an OS Command ('OS Command Injection') in denoland deno
HighCVE-2026-27026: CWE-770: Allocation of Resources Without Limits or Throttling in py-pdf pypdf
MediumActions
Updates to AI analysis require Pro Console access. Upgrade inside Console → Billing.
External Links
Need more coverage?
Upgrade to Pro Console in Console -> Billing for AI refresh and higher limits.
For incident response and remediation, OffSeq services can help resolve threats faster.