Xtooltech Xtool AnyScan Android Application 4.40.40 and prior uses a hardcoded cryptographic key and IV to decrypt update metadata. The key is stored as a static value within the application's code. An attacker with the ability to intercept network traffic can use this hardcoded key to decrypt, modify, and re-encrypt the update manifest, allowing them to direct the application to download a malicious update package.
References
| Link | Resource |
|---|---|
| https://github.com/ab3lson/cve-references/tree/master/CVE-2025-63433 | Third Party Advisory |
| https://www.nowsecure.com/blog/2025/07/16/remote-code-execution-discovered-in-xtool-anyscan-app-risks-to-phones-and-vehicles/ | Exploit Third Party Advisory |
Configurations
History
No history.
Information
Published : 2025-11-24 17:16
Updated : 2025-11-28 17:06
NVD link : CVE-2025-63433
Mitre link : CVE-2025-63433
CVE.ORG link : CVE-2025-63433
JSON object : View
Products Affected
xtooltech
- xtool_anyscan
CWE
CWE-798
Use of Hard-coded Credentials
