CVE-2025-66600

N/A Unknown

📋 TL;DR

FAST/TOOLS industrial control system software lacks HSTS configuration, allowing attackers to perform MITM attacks and intercept web communications. This affects Yokogawa FAST/TOOLS packages RVSVRN, UNSVRN, HMIWEB, FTEES, and HMIMOB from versions R9.01 to R10.04.

💻 Affected Systems

Products:
  • FAST/TOOLS RVSVRN
  • FAST/TOOLS UNSVRN
  • FAST/TOOLS HMIWEB
  • FAST/TOOLS FTEES
  • FAST/TOOLS HMIMOB
Versions: R9.01 to R10.04
Operating Systems: Not specified in CVE
Default Config Vulnerable: ⚠️ Yes
Notes: All installations within affected version range are vulnerable due to missing HSTS headers.

⚠️ Manual Verification Required

This CVE does not have specific version information in our database, so automatic vulnerability detection cannot determine if your system is affected.

Why? The CVE database entry doesn't specify which versions are vulnerable (no version ranges provided by the vendor/NVD).

🔒 Custom verification scripts are available for registered users. Sign up free to download automated test scripts.

Recommended Actions:
  1. Review the CVE details at NVD
  2. Check vendor security advisories for your specific version
  3. Test if the vulnerability is exploitable in your environment
  4. Consider updating to the latest version as a precaution

⚠️ Risk & Real-World Impact

🔴

Worst Case

Attackers intercept sensitive industrial control data, credentials, or manipulate control commands leading to operational disruption or safety incidents.

🟠

Likely Case

Credential theft and session hijacking allowing unauthorized access to control systems.

🟢

If Mitigated

Limited impact with proper network segmentation and monitoring, but still exposes web traffic to interception.

🌐 Internet-Facing: HIGH - Direct exposure to MITM attacks without HSTS protection.
🏢 Internal Only: MEDIUM - Internal attackers or compromised internal systems could still perform MITM attacks.

🎯 Exploit Status

Public PoC: ✅ No
Weaponized: LIKELY
Unauthenticated Exploit: ⚠️ Yes
Complexity: LOW

Standard MITM techniques can exploit this vulnerability without authentication.

🛠️ Fix & Mitigation

✅ Official Fix

Patch Version: R10.05 or later

Vendor Advisory: https://web-material3.yokogawa.com/1/39206/files/YSAR-26-0001-E.pdf

Restart Required: Yes

Instructions:

1. Upgrade to FAST/TOOLS R10.05 or later. 2. Apply vendor patches. 3. Restart affected services.

🔧 Temporary Workarounds

Configure HSTS Headers

all

Manually configure HSTS headers in web server configuration to enforce HTTPS.

Add 'Strict-Transport-Security: max-age=31536000; includeSubDomains' to HTTP response headers

Network Segmentation

all

Isolate FAST/TOOLS systems from untrusted networks.

🧯 If You Can't Patch

  • Implement network-level SSL/TLS inspection and monitoring
  • Use VPN or dedicated secure channels for all FAST/TOOLS communications

🔍 How to Verify

Check if Vulnerable:

Check HTTP responses for missing 'Strict-Transport-Security' header using curl: curl -I http://fasttools-server/

Check Version:

Check FAST/TOOLS version in system administration interface or configuration files.

Verify Fix Applied:

Verify 'Strict-Transport-Security' header is present in HTTP responses after patch/configuration.

📡 Detection & Monitoring

Log Indicators:

  • Multiple HTTP connections without HTTPS redirects
  • Unusual MITM attack patterns

Network Indicators:

  • Cleartext HTTP traffic to FAST/TOOLS web interfaces
  • SSL stripping attempts

SIEM Query:

source="fasttools_web" AND protocol="HTTP" AND NOT protocol="HTTPS"

🔗 References

📤 Share & Export