PatchSiren

PatchSiren cyber security CVE debrief

CVE-2025-66608 Yokogawa CVE debrief

CVE-2025-66608 affects Yokogawa FAST/TOOLS and is rated HIGH with a CVSS v3.1 score of 7.5. According to the CISA CSAF advisory, the product does not adequately validate URLs, and maliciously crafted requests could allow unauthorized access to files on the web server. The supplied CVSS vector indicates network reachability, no privileges required, no user interaction, and high confidentiality impact. CISA published the advisory on 2026-02-10 and identified it as an initial republication of YSAR-26-0001-E.

Vendor
Yokogawa
Product
FAST/TOOLS
CVSS
HIGH 7.5
CISA KEV
Not listed in stored evidence
Original CVE published
2026-02-10
Original CVE updated
2026-02-10
Advisory published
2026-02-10
Advisory updated
2026-02-10

Who should care

Organizations running Yokogawa FAST/TOOLS, especially OT/ICS operators, system administrators, and security teams responsible for web-facing or enterprise-reachable industrial control system assets.

Technical summary

The advisory describes a URL validation flaw in Yokogawa FAST/TOOLS. CISA states that an attacker could send maliciously crafted requests to gain unauthorized access to files on the web server. The provided CVSS v3.1 vector is CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N, which aligns with a remotely reachable issue that requires no prior privileges or user interaction and can expose confidential data. The source material does not include exploit details or evidence of active exploitation.

Defensive priority

High

Recommended defensive actions

  • Update Yokogawa FAST/TOOLS to revision R10.04 and apply patch software CS_e12787, as recommended by Yokogawa.
  • After the patch is applied, apply R10.04 SP3.
  • Restrict access to FAST/TOOLS web interfaces to trusted management networks and enforce OT/ICS segmentation, firewalling, and whitelisting where appropriate.
  • Follow Yokogawa and CISA guidance for a broader security program, including patch management, antivirus, backups, hardening, and recovery planning.
  • Review web server access logs and related monitoring for abnormal or maliciously crafted requests targeting URL handling.

Evidence notes

Primary evidence comes from the CISA CSAF source item for ICSA-26-041-01, published and modified on 2026-02-10. The advisory text states that the product fails to adequately validate URLs and that malicious requests could grant unauthorized access to files on the web server. The supplied metadata also includes the CVSS v3.1 vector AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N and Yokogawa remediation guidance to update to R10.04, apply CS_e12787, and then apply R10.04 SP3. The provided enrichment marks this CVE as not in KEV.

Official resources

CISA issued the advisory on 2026-02-10 as ICSA-26-041-01 and noted it as an initial republication of YSAR-26-0001-E.