CVE-2025-66602
CRITICALCVSS Vector
CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H
Lifecycle Timeline
2Description
A vulnerability has been found in FAST/TOOLS provided by Yokogawa Electric Corporation. The web server accepts access by IP address. When a worm that randomly searches for IP addresses intrudes into the network, it could potentially be attacked by the worm. The affected products and versions are as follows: FAST/TOOLS (Packages: RVSVRN, UNSVRN, HMIWEB, FTEES, HMIMOB) R9.01 to R10.04
Analysis
Yokogawa FAST/TOOLS SCADA has a vulnerability in its web server component enabling unauthorized access to the industrial control monitoring system.
Technical Context
Yokogawa FAST/TOOLS has a CWE-291 reliance on IP address for authentication vulnerability in its web server component, allowing attackers to bypass access controls.
Affected Products
['Yokogawa FAST/TOOLS']
Remediation
Apply Yokogawa patches. Implement stronger authentication. Segment SCADA networks.
Priority Score
Share
External POC / Exploit Code
Leaving vuln.today