CVE-2025-66603

9.8 CRITICAL

📋 TL;DR

The OPTIONS method vulnerability in Yokogawa FAST/TOOLS web servers exposes HTTP method information that could aid attackers in reconnaissance and subsequent attacks. This affects industrial control system operators using FAST/TOOLS packages RVSVRN, UNSVRN, HMIWEB, FTEES, and HMIMOB from versions R9.01 to R10.04.

💻 Affected Systems

Products:
  • FAST/TOOLS RVSVRN
  • FAST/TOOLS UNSVRN
  • FAST/TOOLS HMIWEB
  • FAST/TOOLS FTEES
  • FAST/TOOLS HMIMOB
Versions: R9.01 to R10.04
Operating Systems: Not specified in advisory
Default Config Vulnerable: ⚠️ Yes
Notes: All installations with affected packages in the specified version range are vulnerable by default.

📦 What is this software?

⚠️ Risk & Real-World Impact

🔴

Worst Case

Attackers use exposed HTTP method information to identify vulnerable endpoints and launch successful attacks like cross-site tracing, authentication bypass, or data exfiltration.

🟠

Likely Case

Attackers gather reconnaissance data about server configuration and available methods to plan targeted attacks against the industrial control system.

🟢

If Mitigated

Limited information disclosure with no direct path to compromise if proper network segmentation and access controls are implemented.

🌐 Internet-Facing: HIGH
🏢 Internal Only: MEDIUM

🎯 Exploit Status

Public PoC: ✅ No
Weaponized: UNKNOWN
Unauthenticated Exploit: ⚠️ Yes
Complexity: LOW

OPTIONS method exploitation typically requires additional vulnerabilities to achieve full compromise, but reconnaissance is trivial.

🛠️ Fix & Mitigation

✅ Official Fix

Patch Version: R10.04 with security update or later versions

Vendor Advisory: https://web-material3.yokogawa.com/1/39206/files/YSAR-26-0001-E.pdf

Restart Required: Yes

Instructions:

1. Download security update from Yokogawa support portal. 2. Apply update following vendor documentation. 3. Restart affected FAST/TOOLS services. 4. Verify OPTIONS method is no longer returning sensitive information.

🔧 Temporary Workarounds

Web Server Configuration Hardening

all

Configure web server to restrict or disable OPTIONS method responses

Specific configuration depends on underlying web server technology (not specified in advisory)

Web Application Firewall Rules

all

Block or sanitize OPTIONS method requests at network perimeter

WAF-specific rules to block OPTIONS requests or filter responses

🧯 If You Can't Patch

  • Implement strict network segmentation to isolate FAST/TOOLS systems from untrusted networks
  • Deploy web application firewall with rules to block or monitor OPTIONS method requests

🔍 How to Verify

Check if Vulnerable:

Send OPTIONS HTTP request to FAST/TOOLS web server and check if it returns supported methods information: curl -X OPTIONS http://target-ip/

Check Version:

Check FAST/TOOLS version through administrative interface or system documentation

Verify Fix Applied:

After patching, OPTIONS request should return minimal information or be blocked entirely

📡 Detection & Monitoring

Log Indicators:

  • HTTP OPTIONS requests in web server logs
  • Unusual reconnaissance activity patterns

Network Indicators:

  • OPTIONS method requests to industrial control system web interfaces
  • Repeated HTTP method probing

SIEM Query:

source="web_server" AND method="OPTIONS" AND dest_ip="FAST/TOOLS_IP"

🔗 References

📤 Share & Export