CVE-2025-66595

5.4 MEDIUM

📋 TL;DR

A Cross-Site Request Forgery (CSRF) vulnerability in Yokogawa's FAST/TOOLS industrial control system allows attackers to compromise user accounts when victims click malicious links. This affects multiple FAST/TOOLS components (RVSVRN, UNSVRN, HMIWEB, FTEES, HMIMOB) from versions R9.01 to R10.04. Industrial operators using these systems are at risk of unauthorized actions being performed on their behalf.

💻 Affected Systems

Products:
  • FAST/TOOLS RVSVRN
  • FAST/TOOLS UNSVRN
  • FAST/TOOLS HMIWEB
  • FAST/TOOLS FTEES
  • FAST/TOOLS HMIMOB
Versions: R9.01 to R10.04
Operating Systems: Not specified in advisory
Default Config Vulnerable: ⚠️ Yes
Notes: Multiple packages/components within FAST/TOOLS are affected. Industrial control systems typically run on Windows-based platforms.

📦 What is this software?

⚠️ Risk & Real-World Impact

🔴

Worst Case

Complete compromise of operator accounts leading to unauthorized control system changes, process manipulation, safety system overrides, or industrial sabotage.

🟠

Likely Case

Unauthorized configuration changes, data manipulation, or privilege escalation within the FAST/TOOLS environment.

🟢

If Mitigated

Limited impact with proper CSRF protections, network segmentation, and user awareness training.

🌐 Internet-Facing: HIGH
🏢 Internal Only: MEDIUM

🎯 Exploit Status

Public PoC: ✅ No
Weaponized: UNKNOWN
Unauthenticated Exploit: ✅ No
Complexity: LOW

CSRF attacks require user interaction (clicking malicious link) but are technically simple to implement. No public exploit code is mentioned in the advisory.

🛠️ Fix & Mitigation

✅ Official Fix

Patch Version: R10.04 or later with security updates

Vendor Advisory: https://web-material3.yokogawa.com/1/39206/files/YSAR-26-0001-E.pdf

Restart Required: Yes

Instructions:

1. Download security updates from Yokogawa support portal. 2. Apply updates to all affected FAST/TOOLS components. 3. Restart affected services. 4. Verify all components are running patched versions.

🔧 Temporary Workarounds

Implement CSRF Tokens

all

Add anti-CSRF tokens to web forms and validate them server-side

Configuration specific to FAST/TOOLS - consult vendor documentation

SameSite Cookie Attribute

all

Configure cookies with SameSite=Strict or Lax attributes

Set-Cookie: session=value; SameSite=Strict; Secure; HttpOnly

🧯 If You Can't Patch

  • Segment FAST/TOOLS systems on isolated networks with no internet access
  • Implement strict access controls and user awareness training about phishing risks

🔍 How to Verify

Check if Vulnerable:

Check FAST/TOOLS version via system administration interface or configuration files

Check Version:

Check version in FAST/TOOLS administration console or configuration files

Verify Fix Applied:

Verify version is R10.04 or later with security updates applied

📡 Detection & Monitoring

Log Indicators:

  • Unexpected configuration changes
  • Unauthorized user actions
  • Multiple failed login attempts followed by successful login

Network Indicators:

  • Unusual HTTP POST requests to FAST/TOOLS endpoints
  • Requests missing CSRF tokens

SIEM Query:

source="fast_tools" AND (action="config_change" OR user="unknown")

🔗 References

📤 Share & Export