Analysis and contextual insights are available on OpenCVE Cloud.
No vendor fix or workaround currently provided.
Additional remediation guidance may be available on OpenCVE Cloud.
Tracking
Sign in to view the affected projects.
No advisories yet.
Fri, 28 Nov 2025 17:15:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| First Time appeared |
Xtooltech xtool Anyscan
|
|
| CPEs | cpe:2.3:a:xtooltech:xtool_anyscan:*:*:*:*:*:android:*:* | |
| Vendors & Products |
Xtooltech xtool Anyscan
|
Wed, 26 Nov 2025 11:15:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| First Time appeared |
Google
Google android Xtooltech Xtooltech anyscan |
|
| Vendors & Products |
Google
Google android Xtooltech Xtooltech anyscan |
Mon, 24 Nov 2025 18:15:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| Weaknesses | CWE-494 | |
| Metrics |
cvssV3_1
|
Mon, 24 Nov 2025 17:00:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| Description | The update mechanism in Xtooltech Xtool AnyScan Android Application 4.40.40 and prior is insecure. The application downloads and extracts update packages containing executable code without performing a cryptographic integrity or authenticity check on their contents. An attacker who can control the update metadata can serve a malicious package, which the application will accept, extract, and later execute, leading to arbitrary code execution. | |
| References |
|
Status: PUBLISHED
Assigner: mitre
Published:
Updated: 2025-11-24T18:08:57.659Z
Reserved: 2025-10-27T00:00:00.000Z
Link: CVE-2025-63434
Updated: 2025-11-24T18:08:51.520Z
Status : Analyzed
Published: 2025-11-24T17:16:08.047
Modified: 2025-11-28T17:06:23.457
Link: CVE-2025-63434
No data.
OpenCVE Enrichment
Updated: 2025-11-26T11:11:10Z