A vulnerability has been found in FAST/TOOLS provided by Yokogawa Electric Corporation.



This product does not
specify MIME types. When an attacker performs a content sniffing attack,
malicious scripts could be executed.



The
affected products and versions are as follows: FAST/TOOLS (Packages: RVSVRN, UNSVRN, HMIWEB, FTEES, HMIMOB) R9.01 to
R10.04

Project Subscriptions

Vendors Products
Yokogawa Subscribe
Fast/tools Subscribe
Advisories

No advisories yet.

Fixes

Solution

No solution given by the vendor.


Workaround

No workaround given by the vendor.

History

Mon, 09 Feb 2026 20:15:00 +0000

Type Values Removed Values Added
Metrics ssvc

{'options': {'Automatable': 'no', 'Exploitation': 'none', 'Technical Impact': 'partial'}, 'version': '2.0.3'}


Mon, 09 Feb 2026 11:00:00 +0000

Type Values Removed Values Added
First Time appeared Yokogawa
Yokogawa fast/tools
Vendors & Products Yokogawa
Yokogawa fast/tools

Mon, 09 Feb 2026 03:30:00 +0000

Type Values Removed Values Added
Description A vulnerability has been found in FAST/TOOLS provided by Yokogawa Electric Corporation. This product does not specify MIME types. When an attacker performs a content sniffing attack, malicious scripts could be executed. The affected products and versions are as follows: FAST/TOOLS (Packages: RVSVRN, UNSVRN, HMIWEB, FTEES, HMIMOB) R9.01 to R10.04
Weaknesses CWE-358
References
Metrics cvssV4_0

{'score': 6.3, 'vector': 'CVSS:4.0/AV:N/AC:L/AT:P/PR:N/UI:N/VC:L/VI:L/VA:N/SC:N/SI:N/SA:N'}


Projects

Sign in to view the affected projects.

cve-icon MITRE

Status: PUBLISHED

Assigner: YokogawaGroup

Published:

Updated: 2026-02-09T19:06:13.694Z

Reserved: 2025-12-05T05:04:18.583Z

Link: CVE-2025-66601

cve-icon Vulnrichment

Updated: 2026-02-09T19:02:37.359Z

cve-icon NVD

Status : Awaiting Analysis

Published: 2026-02-09T04:15:49.297

Modified: 2026-02-09T16:08:35.290

Link: CVE-2025-66601

cve-icon Redhat

No data.

cve-icon OpenCVE Enrichment

Updated: 2026-02-09T10:39:20Z

Weaknesses