PatchSiren cyber security CVE debrief
CVE-2025-66601 Yokogawa CVE debrief
CVE-2025-66601 affects Yokogawa FAST/TOOLS where the product does not specify MIME types. According to the advisory, if an attacker can trigger content sniffing, malicious scripts could execute. CISA published the advisory on 2026-02-10 as ICSA-26-041-01 and the supplied CVSS v3.1 vector rates the issue 6.5/Medium.
- Vendor
- Yokogawa
- Product
- FAST/TOOLS
- CVSS
- MEDIUM 6.5
- CISA KEV
- Not listed in stored evidence
- Original CVE published
- 2026-02-10
- Original CVE updated
- 2026-02-10
- Advisory published
- 2026-02-10
- Advisory updated
- 2026-02-10
Who should care
OT and ICS operators running Yokogawa FAST/TOOLS, especially teams that expose the product through browser-based workflows or manage web-facing deployments. Security, patch-management, and network segmentation teams should also review the advisory and remediation steps.
Technical summary
The source advisory states that FAST/TOOLS does not specify MIME types. In a content-sniffing scenario, the client can interpret content in a way that allows malicious scripts to execute. The supplied CVSS v3.1 vector is AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:L/A:N, which aligns with a network-reachable issue that can affect confidentiality and integrity without impacting availability.
Defensive priority
Medium. Prioritize remediation for any exposed FAST/TOOLS deployment and any environment where browser handling of served content could be influenced by untrusted input.
Recommended defensive actions
- Update to revision R10.04 and apply patch software CS_e12787, as Yokogawa recommends.
- After applying the patch, apply R10.04 SP3.
- Maintain a comprehensive security program that includes patch updates, antivirus software, backup and recovery solutions, zoning, hardening, whitelisting, and firewalls.
- Use Yokogawa security risk assessment services or contact Yokogawa for deployment-specific guidance if needed.
Evidence notes
The supplied CSAF record for ICSA-26-041-01 says FAST/TOOLS does not specify MIME types and that malicious scripts could execute during a content sniffing attack. The record was published and modified on 2026-02-10 and includes revision history showing version 1 as the initial republication of YSAR-26-0001-E. The remediation section recommends R10.04, patch software CS_e12787, and then R10.04 SP3. No KEV entry is provided in the supplied corpus.
Official resources
-
CVE-2025-66601 CVE record
CVE.org
-
CVE-2025-66601 NVD detail
NVD
-
Source item URL
cisa_csaf
-
Source reference
Reference
-
Source reference
Reference
-
Source reference
Reference
-
Source reference
Reference
-
Source reference
Reference
-
Source reference
Reference
-
Source reference
Reference
CISA published the advisory for CVE-2025-66601 on 2026-02-10 (ICSA-26-041-01). The provided record shows a single initial revision and does not include any KEV date or due date.