CVE-2025-63433

Source
https://cve.org/CVERecord?id=CVE-2025-63433
Import Source
https://storage.googleapis.com/cve-osv-conversion/osv-output/CVE-2025-63433.json
JSON Data
https://api.osv.dev/v1/vulns/CVE-2025-63433
Published
2025-11-24T17:16:07.787Z
Modified
2026-03-13T03:40:46.084622Z
Severity
  • 4.6 (Medium) CVSS_V3 - CVSS:3.1/AV:N/AC:L/PR:L/UI:R/S:U/C:L/I:L/A:N CVSS Calculator
Summary
[none]
Details

Xtooltech Xtool AnyScan Android Application 4.40.40 and prior uses a hardcoded cryptographic key and IV to decrypt update metadata. The key is stored as a static value within the application's code. An attacker with the ability to intercept network traffic can use this hardcoded key to decrypt, modify, and re-encrypt the update manifest, allowing them to direct the application to download a malicious update package.

References

Affected packages

Git /

Affected ranges

Database specific

source
"https://storage.googleapis.com/cve-osv-conversion/osv-output/CVE-2025-63433.json"
unresolved_ranges
[
    {
        "events": [
            {
                "introduced": "0"
            },
            {
                "last_affected": "4.40.40"
            }
        ]
    }
]