CVE-2025-66606

CRITICAL
2026-02-09 7168b535-132a-4efe-a076-338f829b2eb9
9.6
CVSS 3.1
Share

CVSS Vector

CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:H/I:H/A:H
Attack Vector
Network
Attack Complexity
Low
Privileges Required
None
User Interaction
Required
Scope
Changed
Confidentiality
High
Integrity
High
Availability
High

Lifecycle Timeline

2
Analysis Generated
Mar 12, 2026 - 21:54 vuln.today
CVE Published
Feb 09, 2026 - 04:15 nvd
CRITICAL 9.6

Description

A vulnerability has been found in FAST/TOOLS provided by Yokogawa Electric Corporation. This product does not properly encode URLs. An attacker could tamper with web pages or execute malicious scripts. The affected products and versions are as follows: FAST/TOOLS (Packages: RVSVRN, UNSVRN, HMIWEB, FTEES, HMIMOB) R9.01 to R10.04

Analysis

Yokogawa FAST/TOOLS has a third vulnerability involving improper encoding of output that could enable injection attacks against the SCADA web interface.

Technical Context

CWE-86 improper neutralization of invalid characters in identifiers in Yokogawa FAST/TOOLS, the third vulnerability in the advisory.

Affected Products

['Yokogawa FAST/TOOLS']

Remediation

Apply all Yokogawa FAST/TOOLS patches.

Priority Score

48
Low Medium High Critical
KEV: 0
EPSS: +0.0
CVSS: +48
POC: 0

Share

CVE-2025-66606 vulnerability details – vuln.today

This site uses cookies essential for authentication and security. No tracking or analytics cookies are used. Privacy Policy