Xtooltech Xtool AnyScan Android Application 4.40.40 and prior uses a hardcoded cryptographic key and IV to decrypt update metadata. The key is stored as a static value within the application's code. An attacker with the ability to intercept network traffic can use this hardcoded key to decrypt, modify, and re-encrypt the update manifest, allowing them to direct the application to download a malicious update package.
Metrics
Affected Vendors & Products
References
History
Fri, 28 Nov 2025 17:15:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| First Time appeared |
Xtooltech xtool Anyscan
|
|
| CPEs | cpe:2.3:a:xtooltech:xtool_anyscan:*:*:*:*:*:android:*:* | |
| Vendors & Products |
Xtooltech xtool Anyscan
|
Wed, 26 Nov 2025 11:15:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| First Time appeared |
Google
Google android Xtooltech Xtooltech anyscan |
|
| Vendors & Products |
Google
Google android Xtooltech Xtooltech anyscan |
Mon, 24 Nov 2025 18:15:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| Weaknesses | CWE-798 | |
| Metrics |
cvssV3_1
|
Mon, 24 Nov 2025 17:00:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| Description | Xtooltech Xtool AnyScan Android Application 4.40.40 and prior uses a hardcoded cryptographic key and IV to decrypt update metadata. The key is stored as a static value within the application's code. An attacker with the ability to intercept network traffic can use this hardcoded key to decrypt, modify, and re-encrypt the update manifest, allowing them to direct the application to download a malicious update package. | |
| References |
|
Status: PUBLISHED
Assigner: mitre
Published: 2025-11-24T00:00:00.000Z
Updated: 2025-11-24T18:10:06.455Z
Reserved: 2025-10-27T00:00:00.000Z
Link: CVE-2025-63433
Updated: 2025-11-24T18:09:36.751Z
Status : Analyzed
Published: 2025-11-24T17:16:07.787
Modified: 2025-11-28T17:06:07.163
Link: CVE-2025-63433
No data.