Analysis and contextual insights are available on OpenCVE Cloud.
No vendor fix or workaround currently provided.
Additional remediation guidance may be available on OpenCVE Cloud.
Tracking
Sign in to view the affected projects.
No advisories yet.
Fri, 28 Nov 2025 17:15:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| First Time appeared |
Xtooltech xtool Anyscan
|
|
| CPEs | cpe:2.3:a:xtooltech:xtool_anyscan:*:*:*:*:*:android:*:* | |
| Vendors & Products |
Xtooltech xtool Anyscan
|
Wed, 26 Nov 2025 11:15:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| First Time appeared |
Google
Google android Xtooltech Xtooltech anyscan |
|
| Vendors & Products |
Google
Google android Xtooltech Xtooltech anyscan |
Mon, 24 Nov 2025 18:15:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| Weaknesses | CWE-798 | |
| Metrics |
cvssV3_1
|
Mon, 24 Nov 2025 17:00:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| Description | Xtooltech Xtool AnyScan Android Application 4.40.40 and prior uses a hardcoded cryptographic key and IV to decrypt update metadata. The key is stored as a static value within the application's code. An attacker with the ability to intercept network traffic can use this hardcoded key to decrypt, modify, and re-encrypt the update manifest, allowing them to direct the application to download a malicious update package. | |
| References |
|
Status: PUBLISHED
Assigner: mitre
Published:
Updated: 2025-11-24T18:10:06.455Z
Reserved: 2025-10-27T00:00:00.000Z
Link: CVE-2025-63433
Updated: 2025-11-24T18:09:36.751Z
Status : Analyzed
Published: 2025-11-24T17:16:07.787
Modified: 2025-11-28T17:06:07.163
Link: CVE-2025-63433
No data.
OpenCVE Enrichment
Updated: 2025-11-26T11:10:39Z