CVE-2025-66603

A vulnerability has been found in FAST/TOOLS provided by Yokogawa Electric Corporation. The web server accepts the OPTIONS method. An attacker could potentially use this information to carry out other attacks. The affected products and versions are as follows: FAST/TOOLS (Packages: RVSVRN, UNSVRN, HMIWEB, FTEES, HMIMOB) R9.01 to R10.04
Configurations

Configuration 1 (hide)

cpe:2.3:a:yokogawa:fast\/tools:*:*:*:*:*:*:*:*

History

05 Mar 2026, 13:13

Type Values Removed Values Added
References () https://web-material3.yokogawa.com/1/39206/files/YSAR-26-0001-E.pdf - () https://web-material3.yokogawa.com/1/39206/files/YSAR-26-0001-E.pdf - Vendor Advisory
CVSS v2 : unknown
v3 : unknown
v2 : unknown
v3 : 9.8
First Time Yokogawa fast\/tools
Yokogawa
Summary
  • (es) Se ha encontrado una vulnerabilidad en FAST/TOOLS proporcionado por Yokogawa Electric Corporation. El servidor web acepta el método OPTIONS. Un atacante podría usar potencialmente esta información para llevar a cabo otros ataques. Los productos y versiones afectados son los siguientes: FAST/TOOLS (Paquetes: RVSVRN, UNSVRN, HMIWEB, FTEES, HMIMOB) R9.01 a R10.04
CPE cpe:2.3:a:yokogawa:fast\/tools:*:*:*:*:*:*:*:*

09 Feb 2026, 04:15

Type Values Removed Values Added
New CVE

Information

Published : 2026-02-09 04:15

Updated : 2026-03-05 13:13


NVD link : CVE-2025-66603

Mitre link : CVE-2025-66603

CVE.ORG link : CVE-2025-66603


JSON object : View

Products Affected

yokogawa

  • fast\/tools
CWE
CWE-358

Improperly Implemented Security Check for Standard