A vulnerability has been found in FAST/TOOLS provided by Yokogawa Electric Corporation.
This product does not
specify MIME types. When an attacker performs a content sniffing attack,
malicious scripts could be executed.
The
affected products and versions are as follows: FAST/TOOLS (Packages: RVSVRN, UNSVRN, HMIWEB, FTEES, HMIMOB) R9.01 to
R10.04
References
| Link | Resource |
|---|---|
| https://web-material3.yokogawa.com/1/39206/files/YSAR-26-0001-E.pdf | Vendor Advisory |
Configurations
History
05 Mar 2026, 13:35
| Type | Values Removed | Values Added |
|---|---|---|
| Summary |
|
|
| First Time |
Yokogawa fast\/tools
Yokogawa |
|
| References | () https://web-material3.yokogawa.com/1/39206/files/YSAR-26-0001-E.pdf - Vendor Advisory | |
| CPE | cpe:2.3:a:yokogawa:fast\/tools:*:*:*:*:*:*:*:* | |
| CVSS |
v2 : v3 : |
v2 : unknown
v3 : 6.1 |
09 Feb 2026, 04:15
| Type | Values Removed | Values Added |
|---|---|---|
| New CVE |
Information
Published : 2026-02-09 04:15
Updated : 2026-03-05 13:35
NVD link : CVE-2025-66601
Mitre link : CVE-2025-66601
CVE.ORG link : CVE-2025-66601
JSON object : View
Products Affected
yokogawa
- fast\/tools
CWE
CWE-358
Improperly Implemented Security Check for Standard
