CVE-2025-66606
📋 TL;DR
A URL encoding vulnerability in Yokogawa's FAST/TOOLS industrial control system allows attackers to manipulate web pages or execute malicious scripts. This affects multiple components (RVSVRN, UNSVRN, HMIWEB, FTEES, HMIMOB) in versions R9.01 through R10.04. Industrial operators using these systems are at risk of web-based attacks.
💻 Affected Systems
- FAST/TOOLS RVSVRN
- FAST/TOOLS UNSVRN
- FAST/TOOLS HMIWEB
- FAST/TOOLS FTEES
- FAST/TOOLS HMIMOB
📦 What is this software?
Fast\/tools by Yokogawa
⚠️ Risk & Real-World Impact
Worst Case
Complete compromise of HMI/web interfaces allowing script execution, data manipulation, and potential control system impact
Likely Case
Web page tampering, session hijacking, or limited script execution affecting user interfaces
If Mitigated
Limited impact if proper network segmentation and web security controls are implemented
🎯 Exploit Status
URL encoding vulnerabilities typically require minimal technical skill to exploit via web interfaces
🛠️ Fix & Mitigation
✅ Official Fix
Patch Version: R10.04 with security updates or later versions
Vendor Advisory: https://web-material3.yokogawa.com/1/39206/files/YSAR-26-0001-E.pdf
Restart Required: Yes
Instructions:
1. Download security updates from Yokogawa support portal. 2. Apply patches to affected FAST/TOOLS components. 3. Restart affected services. 4. Verify functionality.
🔧 Temporary Workarounds
Network Segmentation
allIsolate FAST/TOOLS systems from untrusted networks and internet
Web Application Firewall
allDeploy WAF with URL encoding validation rules
🧯 If You Can't Patch
- Implement strict network access controls to limit web interface exposure
- Monitor for unusual web traffic patterns and URL manipulation attempts
🔍 How to Verify
Check if Vulnerable:
Check FAST/TOOLS version against affected range R9.01-R10.04
Check Version:
Check version through FAST/TOOLS administration interface or system documentation
Verify Fix Applied:
Verify installation of security updates from Yokogawa and version is R10.04+ with patches
📡 Detection & Monitoring
Log Indicators:
- Unusual URL patterns in web server logs
- Multiple failed URL encoding attempts
- Suspicious web requests to FAST/TOOLS interfaces
Network Indicators:
- Malformed URLs targeting FAST/TOOLS web services
- Script injection patterns in HTTP traffic
SIEM Query:
web.url contains "fast/tools" AND (web.url contains encoded characters OR web.url length abnormal)