CVE-2025-66605
📋 TL;DR
A vulnerability in Yokogawa's FAST/TOOLS software allows browser autocomplete to save sensitive input data from web interfaces. This affects industrial control system operators using FAST/TOOLS packages RVSVRN, UNSVRN, HMIWEB, FTEES, and HMIMOB from versions R9.01 to R10.04.
💻 Affected Systems
- FAST/TOOLS RVSVRN
- FAST/TOOLS UNSVRN
- FAST/TOOLS HMIWEB
- FAST/TOOLS FTEES
- FAST/TOOLS HMIMOB
📦 What is this software?
Fast\/tools by Yokogawa
⚠️ Risk & Real-World Impact
Worst Case
Sensitive operational data (credentials, configuration parameters, control commands) could be persistently stored in browsers and potentially accessed by unauthorized users on shared or compromised systems.
Likely Case
Operational data leakage through browser autocomplete storage, potentially exposing sensitive industrial control information to subsequent users of the same browser/system.
If Mitigated
Limited exposure if browsers are properly secured, autocomplete is disabled, and systems are not shared between users.
🎯 Exploit Status
Exploitation requires user interaction with the web interface and relies on browser autocomplete behavior rather than direct code execution.
🛠️ Fix & Mitigation
✅ Official Fix
Patch Version: R10.04 with security update or later versions
Vendor Advisory: https://web-material3.yokogawa.com/1/39206/files/YSAR-26-0001-E.pdf
Restart Required: Yes
Instructions:
1. Apply Yokogawa security update for FAST/TOOLS. 2. Update to R10.04 or later. 3. Restart affected services. 4. Verify autocomplete attributes are properly disabled on sensitive input fields.
🔧 Temporary Workarounds
Browser Autocomplete Disable
allConfigure browsers to disable autocomplete for the FAST/TOOLS web interface
Browser-specific: Disable autocomplete in browser settings or use autocomplete='off' attribute injection via browser extensions
Input Field Protection
allManually add autocomplete='off' to sensitive input fields in web interface
Modify HTML forms to include autocomplete='off' attribute on sensitive input fields
🧯 If You Can't Patch
- Implement strict browser usage policies prohibiting saving of form data
- Use dedicated workstations for FAST/TOOLS access with browser data clearing after each session
🔍 How to Verify
Check if Vulnerable:
Inspect web interface input fields for missing autocomplete='off' attribute on sensitive data fields using browser developer tools
Check Version:
Check FAST/TOOLS version through system administration interface or vendor documentation
Verify Fix Applied:
Verify autocomplete='off' is present on all sensitive input fields in the web interface HTML
📡 Detection & Monitoring
Log Indicators:
- Unusual browser autocomplete data storage patterns
- Multiple user sessions accessing same sensitive data fields
Network Indicators:
- HTTP traffic to FAST/TOOLS web interfaces with form submissions
SIEM Query:
Search for browser autocomplete data storage events related to FAST/TOOLS web interface URLs