PatchSiren

PatchSiren cyber security CVE debrief

CVE-2025-66595 Yokogawa CVE debrief

CVE-2025-66595 affects Yokogawa FAST/TOOLS and was publicly republished by CISA on 2026-02-10 as ICSA-26-041-01. The advisory says the product is vulnerable to cross-site request forgery (CSRF) and that a crafted link could compromise a user's account. The supplied CVSS vector rates the issue 5.3/Medium, and the vendor remediation path is to move to R10.04, apply patch software CS_e12787, then apply R10.04 SP3.

Vendor
Yokogawa
Product
FAST/TOOLS
CVSS
MEDIUM 5.3
CISA KEV
Not listed in stored evidence
Original CVE published
2026-02-10
Original CVE updated
2026-02-10
Advisory published
2026-02-10
Advisory updated
2026-02-10

Who should care

Organizations running Yokogawa FAST/TOOLS, especially OT/ICS teams, system administrators, patch managers, and any environment where users access the product through a browser or web session.

Technical summary

This is a CSRF weakness, mapped in the advisory references to CWE-352. In practical terms, an attacker may induce an authenticated user to submit unintended actions through a crafted link or similar request flow, creating account-compromise risk. The supplied advisory text emphasizes crafted-link delivery, while the supplied CVSS vector is AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:L/A:N.

Defensive priority

Medium priority overall, with higher urgency if FAST/TOOLS is exposed to broader user access, administrative workflows, or externally reachable interfaces. Apply vendor remediation promptly because the issue can affect account integrity.

Recommended defensive actions

  • Update Yokogawa FAST/TOOLS to revision R10.04.
  • Apply patch software CS_e12787 as directed by the vendor.
  • After the patch is applied, apply R10.04 SP3.
  • Review which users can reach FAST/TOOLS web interfaces and limit access to trusted administrative networks where possible.
  • Follow CISA ICS recommended practices and Yokogawa's broader security program guidance, including patch management, hardening, zoning, firewalls, and whitelisting.
  • Validate affected installations and change-control steps against the CISA advisory and vendor instructions before deployment.

Evidence notes

Grounded in the supplied CISA CSAF source item for ICSA-26-041-01 and its linked official references. The source metadata identifies Yokogawa FAST/TOOLS, describes a CSRF issue, and lists the vendor remediation sequence R10.04 -> CS_e12787 -> R10.04 SP3. The supplied references also include CWE-352, the CVE record, CISA advisory page, and CISA ICS guidance resources. No KEV listing or ransomware linkage is present in the supplied corpus.

Official resources

Publicly disclosed in CISA advisory ICSA-26-041-01 on 2026-02-10; the supplied timeline uses the advisory publication/republication date.