CVE-2025-66598

A vulnerability has been found in FAST/TOOLS provided by Yokogawa Electric Corporation. This product supports old SSL/TLS versions, potentially allowing an attacker to decrypt communications with the web server. The affected products and versions are as follows: FAST/TOOLS (Packages: RVSVRN, UNSVRN, HMIWEB, FTEES, HMIMOB) R9.01 to R10.04
Configurations

Configuration 1 (hide)

cpe:2.3:a:yokogawa:fast\/tools:*:*:*:*:*:*:*:*

History

06 Mar 2026, 20:25

Type Values Removed Values Added
CVSS v2 : unknown
v3 : unknown
v2 : unknown
v3 : 7.5
CPE cpe:2.3:a:yokogawa:fast\/tools:*:*:*:*:*:*:*:*
References () https://web-material3.yokogawa.com/1/39206/files/YSAR-26-0001-E.pdf - () https://web-material3.yokogawa.com/1/39206/files/YSAR-26-0001-E.pdf - Vendor Advisory
Summary
  • (es) Se ha encontrado una vulnerabilidad en FAST/TOOLS proporcionado por Yokogawa Electric Corporation. Este producto soporta versiones antiguas de SSL/TLS, lo que podría permitir a un atacante descifrar las comunicaciones con el servidor web. Los productos y versiones afectados son los siguientes: FAST/TOOLS (Paquetes: RVSVRN, UNSVRN, HMIWEB, FTEES, HMIMOB) R9.01 a R10.04
First Time Yokogawa fast\/tools
Yokogawa

09 Feb 2026, 05:16

Type Values Removed Values Added
New CVE

Information

Published : 2026-02-09 05:16

Updated : 2026-03-06 20:25


NVD link : CVE-2025-66598

Mitre link : CVE-2025-66598

CVE.ORG link : CVE-2025-66598


JSON object : View

Products Affected

yokogawa

  • fast\/tools
CWE
CWE-327

Use of a Broken or Risky Cryptographic Algorithm