Metrics
Affected Vendors & Products
No advisories yet.
Solution
No solution given by the vendor.
Workaround
No workaround given by the vendor.
Wed, 26 Nov 2025 11:15:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| First Time appeared |
Google
Google android Xtooltech Xtooltech anyscan |
|
| Vendors & Products |
Google
Google android Xtooltech Xtooltech anyscan |
Mon, 24 Nov 2025 18:15:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| Weaknesses | CWE-798 | |
| Metrics |
cvssV3_1
|
Mon, 24 Nov 2025 17:00:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| Description | Xtooltech Xtool AnyScan Android Application 4.40.40 and prior uses a hardcoded cryptographic key and IV to decrypt update metadata. The key is stored as a static value within the application's code. An attacker with the ability to intercept network traffic can use this hardcoded key to decrypt, modify, and re-encrypt the update manifest, allowing them to direct the application to download a malicious update package. | |
| References |
|
Status: PUBLISHED
Assigner: mitre
Published:
Updated: 2025-11-24T18:10:06.455Z
Reserved: 2025-10-27T00:00:00.000Z
Link: CVE-2025-63433
Updated: 2025-11-24T18:09:36.751Z
Status : Awaiting Analysis
Published: 2025-11-24T17:16:07.787
Modified: 2025-11-25T22:16:16.690
Link: CVE-2025-63433
No data.
OpenCVE Enrichment
Updated: 2025-11-26T11:10:39Z