Home

Description

Xtooltech Xtool AnyScan Android Application 4.40.40 and prior uses a hardcoded cryptographic key and IV to decrypt update metadata. The key is stored as a static value within the application's code. An attacker with the ability to intercept network traffic can use this hardcoded key to decrypt, modify, and re-encrypt the update manifest, allowing them to direct the application to download a malicious update package.

PUBLISHED Reserved 2025-10-27 | Published 2025-11-24 | Updated 2025-11-24 | Assigner mitre

References

www.nowsecure.com/...yscan-app-risks-to-phones-and-vehicles/

github.com/ab3lson/cve-references/tree/master/CVE-2025-63433

cve.org (CVE-2025-63433)

nvd.nist.gov (CVE-2025-63433)

Download JSON