CVE-2025-66597

A vulnerability has been found in FAST/TOOLS provided by Yokogawa Electric Corporation. This product supports weak cryptographic algorithms, potentially allowing an attacker to decrypt communications with the web server. The affected products and versions are as follows: FAST/TOOLS (Packages: RVSVRN, UNSVRN, HMIWEB, FTEES, HMIMOB) R9.01 to R10.04
Configurations

Configuration 1 (hide)

cpe:2.3:a:yokogawa:fast\/tools:*:*:*:*:*:*:*:*

History

06 Mar 2026, 20:29

Type Values Removed Values Added
CPE cpe:2.3:a:yokogawa:fast\/tools:*:*:*:*:*:*:*:*
References () https://web-material3.yokogawa.com/1/39206/files/YSAR-26-0001-E.pdf - () https://web-material3.yokogawa.com/1/39206/files/YSAR-26-0001-E.pdf - Vendor Advisory
Summary
  • (es) Se ha encontrado una vulnerabilidad en FAST/TOOLS proporcionado por Yokogawa Electric Corporation. Este producto soporta algoritmos criptográficos débiles, lo que podría permitir a un atacante descifrar las comunicaciones con el servidor web. Los productos y versiones afectados son los siguientes: FAST/TOOLS (Paquetes: RVSVRN, UNSVRN, HMIWEB, FTEES, HMIMOB) R9.01 a R10.04
CVSS v2 : unknown
v3 : unknown
v2 : unknown
v3 : 7.5
First Time Yokogawa fast\/tools
Yokogawa

09 Feb 2026, 05:16

Type Values Removed Values Added
New CVE

Information

Published : 2026-02-09 05:16

Updated : 2026-03-06 20:29


NVD link : CVE-2025-66597

Mitre link : CVE-2025-66597

CVE.ORG link : CVE-2025-66597


JSON object : View

Products Affected

yokogawa

  • fast\/tools
CWE
CWE-327

Use of a Broken or Risky Cryptographic Algorithm