Description

Xtooltech Xtool AnyScan Android Application 4.40.40 and prior uses a hardcoded cryptographic key and IV to decrypt update metadata. The key is stored as a static value within the application's code. An attacker with the ability to intercept network traffic can use this hardcoded key to decrypt, modify, and re-encrypt the update manifest, allowing them to direct the application to download a malicious update package.

INFO

Published Date :

2025-11-24T00:00:00.000Z

Last Modified :

2025-11-24T18:10:06.455Z

Source :

mitre
AFFECTED PRODUCTS

The following products are affected by CVE-2025-63433 vulnerability.

Vendors Products
Google
  • Android
Xtooltech
  • Anyscan
  • Xtool Anyscan
REFERENCES

CVSS Vulnerability Scoring System

Detailed values of each vector for above chart.
Attack Vector
Attack Complexity
Privileges Required
User Interaction
Scope
Confidentiality Impact
Integrity Impact
Availability Impact