A vulnerability has been found in FAST/TOOLS provided by Yokogawa Electric Corporation.
This product supports
old SSL/TLS versions, potentially allowing an attacker to decrypt
communications with the web server.
The
affected products and versions are as follows: FAST/TOOLS (Packages: RVSVRN, UNSVRN, HMIWEB, FTEES, HMIMOB) R9.01 to
R10.04
References
| Link | Resource |
|---|---|
| https://web-material3.yokogawa.com/1/39206/files/YSAR-26-0001-E.pdf | Vendor Advisory |
Configurations
History
06 Mar 2026, 20:25
| Type | Values Removed | Values Added |
|---|---|---|
| CVSS |
v2 : v3 : |
v2 : unknown
v3 : 7.5 |
| CPE | cpe:2.3:a:yokogawa:fast\/tools:*:*:*:*:*:*:*:* | |
| References | () https://web-material3.yokogawa.com/1/39206/files/YSAR-26-0001-E.pdf - Vendor Advisory | |
| Summary |
|
|
| First Time |
Yokogawa fast\/tools
Yokogawa |
09 Feb 2026, 05:16
| Type | Values Removed | Values Added |
|---|---|---|
| New CVE |
Information
Published : 2026-02-09 05:16
Updated : 2026-03-06 20:25
NVD link : CVE-2025-66598
Mitre link : CVE-2025-66598
CVE.ORG link : CVE-2025-66598
JSON object : View
Products Affected
yokogawa
- fast\/tools
CWE
CWE-327
Use of a Broken or Risky Cryptographic Algorithm
