CVE-2025-66608

7.5 HIGH

📋 TL;DR

A path traversal vulnerability in Yokogawa's FAST/TOOLS software allows attackers to bypass URL validation and access arbitrary files on the web server. This affects FAST/TOOLS packages RVSVRN, UNSVRN, HMIWEB, FTEES, and HMIMOB from versions R9.01 through R10.04.

💻 Affected Systems

Products:
  • FAST/TOOLS RVSVRN
  • FAST/TOOLS UNSVRN
  • FAST/TOOLS HMIWEB
  • FAST/TOOLS FTEES
  • FAST/TOOLS HMIMOB
Versions: R9.01 to R10.04
Operating Systems: Not specified in advisory
Default Config Vulnerable: ⚠️ Yes
Notes: All installations with affected packages are vulnerable by default.

📦 What is this software?

⚠️ Risk & Real-World Impact

🔴

Worst Case

Complete compromise of sensitive files including configuration files, credentials, and proprietary data leading to system takeover or industrial espionage.

🟠

Likely Case

Unauthorized access to configuration files, logs, and potentially sensitive operational data stored on the web server.

🟢

If Mitigated

Limited file access restricted by proper input validation and file system permissions.

🌐 Internet-Facing: HIGH - Directly exploitable via HTTP requests without authentication.
🏢 Internal Only: HIGH - Even internal attackers can exploit this vulnerability to access sensitive files.

🎯 Exploit Status

Public PoC: ✅ No
Weaponized: UNKNOWN
Unauthenticated Exploit: ⚠️ Yes
Complexity: LOW

Exploitation requires sending specially crafted HTTP requests but no authentication is needed.

🛠️ Fix & Mitigation

✅ Official Fix

Patch Version: R10.04 with security patch or later versions

Vendor Advisory: https://web-material3.yokogawa.com/1/39206/files/YSAR-26-0001-E.pdf

Restart Required: Yes

Instructions:

1. Download the security patch from Yokogawa support portal. 2. Apply the patch following vendor instructions. 3. Restart affected FAST/TOOLS services. 4. Verify the fix by testing URL validation.

🔧 Temporary Workarounds

Network Segmentation

all

Restrict network access to FAST/TOOLS web interfaces using firewalls.

Web Application Firewall

all

Deploy WAF with path traversal protection rules to block malicious requests.

🧯 If You Can't Patch

  • Implement strict network access controls to limit exposure to trusted sources only.
  • Monitor web server logs for unusual file access patterns and path traversal attempts.

🔍 How to Verify

Check if Vulnerable:

Check FAST/TOOLS version via administrative interface or configuration files. Versions R9.01 through R10.04 are vulnerable.

Check Version:

Check version in FAST/TOOLS administration console or configuration files (specific command depends on installation).

Verify Fix Applied:

Test URL validation by attempting path traversal requests after patch application. Successful requests should be blocked.

📡 Detection & Monitoring

Log Indicators:

  • HTTP requests containing '../' sequences
  • Unusual file access patterns from web server process
  • Access to files outside expected web directories

Network Indicators:

  • HTTP requests with encoded path traversal sequences (%2e%2e%2f)
  • Multiple failed attempts to access sensitive file paths

SIEM Query:

source="web_server" AND (url="*../*" OR url="*..%2f*" OR url="*%2e%2e%2f*")

🔗 References

📤 Share & Export