A vulnerability has been found in FAST/TOOLS provided by Yokogawa Electric Corporation.
The web server accepts
access by IP address. When a worm that randomly searches for IP addresses
intrudes into the network, it could potentially be attacked by the worm.
The
affected products and versions are as follows: FAST/TOOLS (Packages: RVSVRN, UNSVRN, HMIWEB, FTEES, HMIMOB) R9.01 to
R10.04
References
| Link | Resource |
|---|---|
| https://web-material3.yokogawa.com/1/39206/files/YSAR-26-0001-E.pdf | Vendor Advisory |
Configurations
History
05 Mar 2026, 13:19
| Type | Values Removed | Values Added |
|---|---|---|
| CVSS |
v2 : v3 : |
v2 : unknown
v3 : 9.8 |
| Summary |
|
|
| CPE | cpe:2.3:a:yokogawa:fast\/tools:*:*:*:*:*:*:*:* | |
| First Time |
Yokogawa fast\/tools
Yokogawa |
|
| References | () https://web-material3.yokogawa.com/1/39206/files/YSAR-26-0001-E.pdf - Vendor Advisory |
09 Feb 2026, 04:15
| Type | Values Removed | Values Added |
|---|---|---|
| New CVE |
Information
Published : 2026-02-09 04:15
Updated : 2026-03-05 13:19
NVD link : CVE-2025-66602
Mitre link : CVE-2025-66602
CVE.ORG link : CVE-2025-66602
JSON object : View
Products Affected
yokogawa
- fast\/tools
CWE
CWE-291
Reliance on IP Address for Authentication
