CVE-2025-66599

N/A Unknown

📋 TL;DR

This vulnerability in Yokogawa's FAST/TOOLS software exposes physical file paths on web pages, potentially revealing sensitive system information. Attackers could leverage this information to plan further attacks against the system. Affected users include those running FAST/TOOLS packages RVSVRN, UNSVRN, HMIWEB, FTEES, or HMIMOB between versions R9.01 and R10.04.

💻 Affected Systems

Products:
  • FAST/TOOLS RVSVRN
  • FAST/TOOLS UNSVRN
  • FAST/TOOLS HMIWEB
  • FAST/TOOLS FTEES
  • FAST/TOOLS HMIMOB
Versions: R9.01 to R10.04
Operating Systems: Not specified in advisory
Default Config Vulnerable: ⚠️ Yes
Notes: Multiple packages within the FAST/TOOLS suite are affected. The vulnerability appears to be present in default configurations.

⚠️ Manual Verification Required

This CVE does not have specific version information in our database, so automatic vulnerability detection cannot determine if your system is affected.

Why? The CVE database entry doesn't specify which versions are vulnerable (no version ranges provided by the vendor/NVD).

🔒 Custom verification scripts are available for registered users. Sign up free to download automated test scripts.

Recommended Actions:
  1. Review the CVE details at NVD
  2. Check vendor security advisories for your specific version
  3. Test if the vulnerability is exploitable in your environment
  4. Consider updating to the latest version as a precaution

⚠️ Risk & Real-World Impact

🔴

Worst Case

Attackers use exposed path information to identify and exploit other vulnerabilities, potentially gaining unauthorized access, executing arbitrary code, or compromising the industrial control system.

🟠

Likely Case

Attackers gather reconnaissance data about the system structure, which facilitates targeted attacks against specific components or helps bypass security controls.

🟢

If Mitigated

Information disclosure is limited to path data only, with no direct system compromise if proper network segmentation and access controls are implemented.

🌐 Internet-Facing: HIGH
🏢 Internal Only: MEDIUM

🎯 Exploit Status

Public PoC: ✅ No
Weaponized: UNKNOWN
Unauthenticated Exploit: ⚠️ Yes
Complexity: LOW

The vulnerability involves information disclosure through web pages, which typically requires no authentication and minimal technical skill to observe.

🛠️ Fix & Mitigation

✅ Official Fix

Patch Version: R10.04 or later (check vendor advisory for specific patch details)

Vendor Advisory: https://web-material3.yokogawa.com/1/39206/files/YSAR-26-0001-E.pdf

Restart Required: Yes

Instructions:

1. Review Yokogawa advisory YSAR-26-0001-E. 2. Apply vendor-provided patches or upgrade to R10.04+. 3. Restart affected FAST/TOOLS services. 4. Verify path disclosure is no longer present.

🔧 Temporary Workarounds

Network Access Restriction

all

Restrict network access to FAST/TOOLS web interfaces to authorized users only

Web Application Firewall Rules

all

Configure WAF to block responses containing physical path information

🧯 If You Can't Patch

  • Isolate FAST/TOOLS systems from untrusted networks using firewalls and network segmentation
  • Implement strict access controls and monitor for unusual access patterns to web interfaces

🔍 How to Verify

Check if Vulnerable:

Access FAST/TOOLS web interfaces and check if physical file paths are visible in page content or error messages

Check Version:

Check FAST/TOOLS version through administrative interface or system documentation

Verify Fix Applied:

After patching, verify that physical paths are no longer displayed on web pages

📡 Detection & Monitoring

Log Indicators:

  • Unusual access patterns to web interfaces
  • Multiple failed access attempts followed by successful connections

Network Indicators:

  • External IP addresses accessing internal FAST/TOOLS web interfaces
  • Unusual HTTP requests to path-related endpoints

SIEM Query:

source="fast_tools_web" AND (http_status=200 OR http_status=500) AND (content="C:\\" OR content="/var/" OR content="path:")

🔗 References

📤 Share & Export