CVE-2025-66608
Published: 09 February 2026
Summary
CVE-2025-66608 is a high-severity Path Traversal: '\..\filename' (CWE-29) vulnerability in Yokogawa Fast\/Tools. Its CVSS base score is 7.5 (High).
Operationally, exploitation aligns with the MITRE ATT&CK technique Exploit Public-Facing Application (T1190); ranked at the 30.7th percentile by exploit likelihood (below the median); it is not currently listed in the CISA KEV catalog.
Threat & Defense at a Glance
Threat & Defense Details
MITRE ATT&CK Enterprise TechniquesAI
Why these techniques?
Path traversal in public-facing web server directly enables remote file read (T1190), local data collection (T1005), and credential file access (T1552.001).
NVD Description
A vulnerability has been found in FAST/TOOLS provided by Yokogawa Electric Corporation. This product does not properly validate URLs. An attacker could send specially crafted requests to steal files from the web server. The affected products and versions are as…
more
follows: FAST/TOOLS (Packages: RVSVRN, UNSVRN, HMIWEB, FTEES, HMIMOB) R9.01 to R10.04
Deeper analysisAI
CVE-2025-66608 is a vulnerability in Yokogawa Electric Corporation's FAST/TOOLS software, where the product fails to properly validate URLs. This flaw allows an attacker to send specially crafted requests to steal files from the web server. The affected components include FAST/TOOLS packages RVSVRN, UNSVRN, HMIWEB, FTEES, and HMIMOB in versions from R9.01 to R10.04. The vulnerability has a CVSS v3.1 base score of 7.5 (AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N) and is associated with CWE-29 (Path Traversal: '.../...').
An unauthenticated attacker with network access can exploit this vulnerability due to its low attack complexity and lack of required privileges or user interaction. Successful exploitation enables remote file disclosure from the web server, potentially exposing sensitive configuration data, credentials, or other critical files without impacting integrity or availability.
Mitigation details are provided in Yokogawa's security advisory YSAR-26-0001-E, available at https://web-material3.yokogawa.com/1/39206/files/YSAR-26-0001-E.pdf. Security practitioners should consult this document for patching instructions and workarounds applicable to the affected versions.
Details
- CWE(s)