CVE-2025-66602

A vulnerability has been found in FAST/TOOLS provided by Yokogawa Electric Corporation. The web server accepts access by IP address. When a worm that randomly searches for IP addresses intrudes into the network, it could potentially be attacked by the worm. The affected products and versions are as follows: FAST/TOOLS (Packages: RVSVRN, UNSVRN, HMIWEB, FTEES, HMIMOB) R9.01 to R10.04
Configurations

Configuration 1 (hide)

cpe:2.3:a:yokogawa:fast\/tools:*:*:*:*:*:*:*:*

History

05 Mar 2026, 13:19

Type Values Removed Values Added
CVSS v2 : unknown
v3 : unknown
v2 : unknown
v3 : 9.8
Summary
  • (es) Se ha encontrado una vulnerabilidad en FAST/TOOLS proporcionado por Yokogawa Electric Corporation. El servidor web acepta el acceso por dirección IP. Cuando un gusano que busca aleatoriamente direcciones IP se introduce en la red, podría ser atacado por el gusano. Los productos y versiones afectados son los siguientes: FAST/TOOLS (Paquetes: RVSVRN, UNSVRN, HMIWEB, FTEES, HMIMOB) R9.01 a R10.04
CPE cpe:2.3:a:yokogawa:fast\/tools:*:*:*:*:*:*:*:*
First Time Yokogawa fast\/tools
Yokogawa
References () https://web-material3.yokogawa.com/1/39206/files/YSAR-26-0001-E.pdf - () https://web-material3.yokogawa.com/1/39206/files/YSAR-26-0001-E.pdf - Vendor Advisory

09 Feb 2026, 04:15

Type Values Removed Values Added
New CVE

Information

Published : 2026-02-09 04:15

Updated : 2026-03-05 13:19


NVD link : CVE-2025-66602

Mitre link : CVE-2025-66602

CVE.ORG link : CVE-2025-66602


JSON object : View

Products Affected

yokogawa

  • fast\/tools
CWE
CWE-291

Reliance on IP Address for Authentication