CVE-2025-66596

6.1 MEDIUM

📋 TL;DR

A host header injection vulnerability in Yokogawa FAST/TOOLS allows attackers to redirect users to malicious websites by manipulating request headers. This affects FAST/TOOLS packages RVSVRN, UNSVRN, HMIWEB, FTEES, and HMIMOB from versions R9.01 through R10.04.

💻 Affected Systems

Products:
  • FAST/TOOLS RVSVRN
  • FAST/TOOLS UNSVRN
  • FAST/TOOLS HMIWEB
  • FAST/TOOLS FTEES
  • FAST/TOOLS HMIMOB
Versions: R9.01 to R10.04
Operating Systems: Not specified in advisory
Default Config Vulnerable: ⚠️ Yes
Notes: All configurations using affected packages within the version range are vulnerable.

📦 What is this software?

⚠️ Risk & Real-World Impact

🔴

Worst Case

Users could be redirected to phishing sites that steal credentials or deliver malware, potentially leading to full system compromise.

🟠

Likely Case

Attackers redirect users to malicious sites for credential harvesting or malware distribution.

🟢

If Mitigated

With proper network segmentation and user awareness, impact is limited to potential phishing attempts.

🌐 Internet-Facing: HIGH
🏢 Internal Only: MEDIUM

🎯 Exploit Status

Public PoC: ✅ No
Weaponized: UNKNOWN
Unauthenticated Exploit: ⚠️ Yes
Complexity: LOW

Exploitation requires network access to the vulnerable service but no authentication.

🛠️ Fix & Mitigation

✅ Official Fix

Patch Version: R10.04 with security patch or later versions

Vendor Advisory: https://web-material3.yokogawa.com/1/39206/files/YSAR-26-0001-E.pdf

Restart Required: Yes

Instructions:

1. Download the security patch from Yokogawa support. 2. Apply the patch according to vendor documentation. 3. Restart affected services. 4. Verify the fix is applied.

🔧 Temporary Workarounds

Network Segmentation

all

Restrict network access to FAST/TOOLS services to trusted networks only.

Reverse Proxy Validation

all

Configure reverse proxies to validate and sanitize host headers before forwarding to FAST/TOOLS.

🧯 If You Can't Patch

  • Implement strict network access controls to limit exposure.
  • Deploy web application firewall rules to detect and block malicious host headers.

🔍 How to Verify

Check if Vulnerable:

Check FAST/TOOLS version against affected range (R9.01 to R10.04) and verify if security patches are applied.

Check Version:

Consult FAST/TOOLS documentation or system administration interface for version information.

Verify Fix Applied:

Confirm installation of security patch from vendor advisory and test that invalid host headers no longer cause redirects.

📡 Detection & Monitoring

Log Indicators:

  • Unusual host header values in web server logs
  • Multiple redirect requests from single sources

Network Indicators:

  • HTTP requests with manipulated host headers
  • Unexpected redirects to external domains

SIEM Query:

web_access_logs host_header CONTAINS malicious_domain OR redirect_status = 302 AND dest_ip NOT IN trusted_networks

🔗 References

📤 Share & Export