Cyber Posture

CVE-2025-66606

Critical

Published: 09 February 2026

Published
09 February 2026
Modified
05 March 2026
KEV Added
Patch
CVSS Score 9.6 CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:H/I:H/A:H
EPSS Score 0.0006 18.1th percentile
Risk Priority 19 60% EPSS · 20% KEV · 20% CVSS

Summary

CVE-2025-66606 is a critical-severity Improper Neutralization of Invalid Characters in Identifiers in Web Pages (CWE-86) vulnerability in Yokogawa Fast\/Tools. Its CVSS base score is 9.6 (Critical).

Operationally, exploitation aligns with the MITRE ATT&CK technique Exploit Public-Facing Application (T1190); ranked at the 18.1th percentile by exploit likelihood (below the median); it is not currently listed in the CISA KEV catalog.

The strongest mitigations our analysis identified are NIST 800-53 SI-10 (Information Input Validation) and SI-15 (Information Output Filtering).

Threat & Defense at a Glance

What attackers do: exploitation maps to Exploit Public-Facing Application (T1190) and 1 other technique. What defenders deploy: see the NIST 800-53 controls recommended below.
Threat & Defense Details

Mitigating Controls (NIST 800-53 r5)AI

prevent

SI-15 mandates filtering and encoding of information outputs, directly addressing the improper URL encoding that allows attackers to inject malicious scripts or tamper with web pages.

prevent

SI-10 enforces validation of all inputs including URLs, preventing acceptance of malformed or malicious payloads that exploit the encoding flaw.

prevent

SI-2 requires timely identification, reporting, and correction of software flaws like this improper URL encoding vulnerability through patching.

MITRE ATT&CK Enterprise TechniquesAI

T1190 Exploit Public-Facing Application Initial Access
Adversaries may attempt to exploit a weakness in an Internet-facing host or system to initially access a network.
T1059.007 JavaScript Execution
Adversaries may abuse various implementations of JavaScript for execution.
Why these techniques?

Improper URL encoding (CWE-86) in public-facing web app enables remote script injection/tampering via crafted URLs (T1190); directly facilitates malicious JavaScript execution in browser context (T1059.007).

Confidence: HIGH · MITRE ATT&CK Enterprise v18.1

NVD Description

A vulnerability has been found in FAST/TOOLS provided by Yokogawa Electric Corporation. This product does not properly encode URLs. An attacker could tamper with web pages or execute malicious scripts. The affected products and versions are as follows: FAST/TOOLS (Packages:…

more

RVSVRN, UNSVRN, HMIWEB, FTEES, HMIMOB) R9.01 to R10.04

Deeper analysisAI

CVE-2025-66606 affects FAST/TOOLS software provided by Yokogawa Electric Corporation, specifically the packages RVSVRN, UNSVRN, HMIWEB, FTEES, and HMIMOB in versions R9.01 to R10.04. The vulnerability arises from improper URL encoding, classified under CWE-86, enabling attackers to tamper with web pages or execute malicious scripts. Published on 2026-02-09, it carries a CVSS v3.1 base score of 9.6 (AV:N/AC:L/PR:N/UI:R/S:C/C:H/I:H/A:H), indicating critical severity due to its network accessibility, low complexity, and high impacts across confidentiality, integrity, and availability.

An unauthenticated attacker can exploit this vulnerability remotely over the network with low attack complexity, though it requires user interaction, such as a victim clicking a malicious link or visiting a crafted URL. Exploitation changes the security scope, allowing the attacker to achieve high-level compromise, including execution of arbitrary scripts, web page manipulation, and potential full control over the affected FAST/TOOLS instance.

Yokogawa's security advisory YSAR-26-0001-E, accessible at https://web-material3.yokogawa.com/1/39206/files/YSAR-26-0001-E.pdf, provides details on the vulnerability. Security practitioners should consult this reference for recommended mitigations, patches, or workarounds specific to the affected versions.

Details

CWE(s)

Affected Products

yokogawa
fast\/tools
r9.01 — r10.04

CVEs Like This One

CVE-2025-66603Same product: Yokogawa Fast\/Tools
CVE-2025-66602Same product: Yokogawa Fast\/Tools
CVE-2025-66608Same product: Yokogawa Fast\/Tools
CVE-2025-66598Same product: Yokogawa Fast\/Tools
CVE-2025-66597Same product: Yokogawa Fast\/Tools
CVE-2025-1924Same vendor: Yokogawa
CVE-2026-28417Shared CWE-86

References