A vulnerability has been found in FAST/TOOLS provided by Yokogawa Electric Corporation.
Since there are input
fields on this webpage with the autocomplete attribute enabled, the input
content could be saved in the browser the user is using.
The
affected products and versions are as follows: FAST/TOOLS (Packages: RVSVRN, UNSVRN, HMIWEB, FTEES, HMIMOB) R9.01 to
R10.04
References
| Link | Resource |
|---|---|
| https://web-material3.yokogawa.com/1/39206/files/YSAR-26-0001-E.pdf | Vendor Advisory |
Configurations
History
05 Mar 2026, 12:47
| Type | Values Removed | Values Added |
|---|---|---|
| CVSS |
v2 : v3 : |
v2 : unknown
v3 : 5.3 |
| References | () https://web-material3.yokogawa.com/1/39206/files/YSAR-26-0001-E.pdf - Vendor Advisory | |
| First Time |
Yokogawa fast\/tools
Yokogawa |
|
| CPE | cpe:2.3:a:yokogawa:fast\/tools:*:*:*:*:*:*:*:* | |
| Summary |
|
09 Feb 2026, 04:15
| Type | Values Removed | Values Added |
|---|---|---|
| New CVE |
Information
Published : 2026-02-09 04:15
Updated : 2026-03-05 12:47
NVD link : CVE-2025-66605
Mitre link : CVE-2025-66605
CVE.ORG link : CVE-2025-66605
JSON object : View
Products Affected
yokogawa
- fast\/tools
CWE
CWE-359
Exposure of Private Personal Information to an Unauthorized Actor
