Cyber Posture

CVE-2025-66608

High

Published: 09 February 2026

Published
09 February 2026
Modified
06 March 2026
KEV Added
Patch
CVSS Score 7.5 CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N
EPSS Score 0.0012 30.7th percentile
Risk Priority 15 60% EPSS · 20% KEV · 20% CVSS

Summary

CVE-2025-66608 is a high-severity Path Traversal: '\..\filename' (CWE-29) vulnerability in Yokogawa Fast\/Tools. Its CVSS base score is 7.5 (High).

Operationally, exploitation aligns with the MITRE ATT&CK technique Exploit Public-Facing Application (T1190); ranked at the 30.7th percentile by exploit likelihood (below the median); it is not currently listed in the CISA KEV catalog.

Threat & Defense at a Glance

What attackers do: exploitation maps to Exploit Public-Facing Application (T1190) and 2 other techniques.
Threat & Defense Details

MITRE ATT&CK Enterprise TechniquesAI

T1190 Exploit Public-Facing Application Initial Access
Adversaries may attempt to exploit a weakness in an Internet-facing host or system to initially access a network.
T1005 Data from Local System Collection
Adversaries may search local system sources, such as file systems, configuration files, local databases, virtual machine files, or process memory, to find files of interest and sensitive data prior to Exfiltration.
T1552.001 Credentials In Files Credential Access
Adversaries may search local file systems and remote file shares for files containing insecurely stored credentials.
Why these techniques?

Path traversal in public-facing web server directly enables remote file read (T1190), local data collection (T1005), and credential file access (T1552.001).

Confidence: HIGH · MITRE ATT&CK Enterprise v18.1

NVD Description

A vulnerability has been found in FAST/TOOLS provided by Yokogawa Electric Corporation. This product does not properly validate URLs. An attacker could send specially crafted requests to steal files from the web server. The affected products and versions are as…

more

follows: FAST/TOOLS (Packages: RVSVRN, UNSVRN, HMIWEB, FTEES, HMIMOB) R9.01 to R10.04

Deeper analysisAI

CVE-2025-66608 is a vulnerability in Yokogawa Electric Corporation's FAST/TOOLS software, where the product fails to properly validate URLs. This flaw allows an attacker to send specially crafted requests to steal files from the web server. The affected components include FAST/TOOLS packages RVSVRN, UNSVRN, HMIWEB, FTEES, and HMIMOB in versions from R9.01 to R10.04. The vulnerability has a CVSS v3.1 base score of 7.5 (AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N) and is associated with CWE-29 (Path Traversal: '.../...').

An unauthenticated attacker with network access can exploit this vulnerability due to its low attack complexity and lack of required privileges or user interaction. Successful exploitation enables remote file disclosure from the web server, potentially exposing sensitive configuration data, credentials, or other critical files without impacting integrity or availability.

Mitigation details are provided in Yokogawa's security advisory YSAR-26-0001-E, available at https://web-material3.yokogawa.com/1/39206/files/YSAR-26-0001-E.pdf. Security practitioners should consult this document for patching instructions and workarounds applicable to the affected versions.

Details

CWE(s)

Affected Products

yokogawa
fast\/tools
r9.01 — r10.04

CVEs Like This One

CVE-2025-66603Same product: Yokogawa Fast\/Tools
CVE-2025-66602Same product: Yokogawa Fast\/Tools
CVE-2025-66606Same product: Yokogawa Fast\/Tools
CVE-2025-66597Same product: Yokogawa Fast\/Tools
CVE-2025-66598Same product: Yokogawa Fast\/Tools
CVE-2025-1924Same vendor: Yokogawa
CVE-2026-5627Shared CWE-29
CVE-2026-30828Shared CWE-29
CVE-2024-8859Shared CWE-29
CVE-2024-7033Shared CWE-29

References