A vulnerability has been found in FAST/TOOLS provided by Yokogawa Electric Corporation.
The web server accepts
the OPTIONS method. An attacker could potentially use this information to carry
out other attacks.
The
affected products and versions are as follows: FAST/TOOLS (Packages: RVSVRN, UNSVRN, HMIWEB, FTEES, HMIMOB) R9.01 to
R10.04
References
| Link | Resource |
|---|---|
| https://web-material3.yokogawa.com/1/39206/files/YSAR-26-0001-E.pdf | Vendor Advisory |
Configurations
History
05 Mar 2026, 13:13
| Type | Values Removed | Values Added |
|---|---|---|
| References | () https://web-material3.yokogawa.com/1/39206/files/YSAR-26-0001-E.pdf - Vendor Advisory | |
| CVSS |
v2 : v3 : |
v2 : unknown
v3 : 9.8 |
| First Time |
Yokogawa fast\/tools
Yokogawa |
|
| Summary |
|
|
| CPE | cpe:2.3:a:yokogawa:fast\/tools:*:*:*:*:*:*:*:* |
09 Feb 2026, 04:15
| Type | Values Removed | Values Added |
|---|---|---|
| New CVE |
Information
Published : 2026-02-09 04:15
Updated : 2026-03-05 13:13
NVD link : CVE-2025-66603
Mitre link : CVE-2025-66603
CVE.ORG link : CVE-2025-66603
JSON object : View
Products Affected
yokogawa
- fast\/tools
CWE
CWE-358
Improperly Implemented Security Check for Standard
