PatchSiren

PatchSiren cyber security CVE debrief

CVE-2025-66604 Yokogawa CVE debrief

CVE-2025-66604 is a low-severity information disclosure issue in Yokogawa FAST/TOOLS. The advisory says the library version could be displayed on a web page, which could then be used by an attacker to support other attacks. CISA published the advisory on 2026-02-10 as ICSA-26-041-01.

Vendor
Yokogawa
Product
FAST/TOOLS
CVSS
LOW 3.1
CISA KEV
Not listed in stored evidence
Original CVE published
2026-02-10
Original CVE updated
2026-02-10
Advisory published
2026-02-10
Advisory updated
2026-02-10

Who should care

Operators and administrators of Yokogawa FAST/TOOLS deployments, especially industrial control system environments exposing the web interface, should review whether the affected product and version are in use and apply vendor guidance.

Technical summary

The source advisory describes a web-facing information disclosure condition: the application may reveal a library version on a page. By itself, the issue does not indicate direct code execution or service disruption, but version exposure can help an attacker identify a target’s software stack and tailor subsequent attacks. The advisory assigns CVSS 3.1 AV:N/AC:H/PR:N/UI:R/S:U/C:L/I:N/A:N with a LOW severity score of 3.1.

Defensive priority

Low for immediate impact, but worth addressing during normal maintenance because the issue is publicly disclosed and the vendor provides a specific fixed revision and patch sequence.

Recommended defensive actions

  • Update to revision R10.04 and apply patch software CS_e12787.
  • After the patch is applied, apply R10.04 SP3.
  • Review whether the FAST/TOOLS web interface exposes unnecessary version or diagnostic information.
  • Follow Yokogawa’s broader security program guidance, including patching, antivirus, backup and recovery, zoning, hardening, whitelisting, and firewalls.
  • Use Yokogawa’s contact channel for product-specific remediation questions.

Evidence notes

The source corpus states: “The library version could be displayed on the web page. This information could be exploited by an attacker for other attacks.” It also lists the vendor remediation path to R10.04, CS_e12787, and R10.04 SP3. The CVSS vector provided in the advisory is CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:L/I:N/A:N.

Official resources

Publicly disclosed by CISA on 2026-02-10 in ICSA-26-041-01, which the source notes is an initial republication of YSAR-26-0001-E.