CVE-2025-66605

A vulnerability has been found in FAST/TOOLS provided by Yokogawa Electric Corporation. Since there are input fields on this webpage with the autocomplete attribute enabled, the input content could be saved in the browser the user is using. The affected products and versions are as follows: FAST/TOOLS (Packages: RVSVRN, UNSVRN, HMIWEB, FTEES, HMIMOB) R9.01 to R10.04
Configurations

Configuration 1 (hide)

cpe:2.3:a:yokogawa:fast\/tools:*:*:*:*:*:*:*:*

History

05 Mar 2026, 12:47

Type Values Removed Values Added
CVSS v2 : unknown
v3 : unknown
v2 : unknown
v3 : 5.3
References () https://web-material3.yokogawa.com/1/39206/files/YSAR-26-0001-E.pdf - () https://web-material3.yokogawa.com/1/39206/files/YSAR-26-0001-E.pdf - Vendor Advisory
First Time Yokogawa fast\/tools
Yokogawa
CPE cpe:2.3:a:yokogawa:fast\/tools:*:*:*:*:*:*:*:*
Summary
  • (es) Se ha encontrado una vulnerabilidad en FAST/TOOLS proporcionado por Yokogawa Electric Corporation. Dado que hay campos de entrada en esta página web con el atributo de autocompletar habilitado, el contenido de entrada podría guardarse en el navegador que el usuario está utilizando. Los productos y versiones afectados son los siguientes: FAST/TOOLS (Paquetes: RVSVRN, UNSVRN, HMIWEB, FTEES, HMIMOB) R9.01 a R10.04

09 Feb 2026, 04:15

Type Values Removed Values Added
New CVE

Information

Published : 2026-02-09 04:15

Updated : 2026-03-05 12:47


NVD link : CVE-2025-66605

Mitre link : CVE-2025-66605

CVE.ORG link : CVE-2025-66605


JSON object : View

Products Affected

yokogawa

  • fast\/tools
CWE
CWE-359

Exposure of Private Personal Information to an Unauthorized Actor