4.6
CVE-2025-63433
- EPSS 0.03%
- Veröffentlicht 24.11.2025 00:00:00
- Zuletzt bearbeitet 28.11.2025 17:06:07
- Quelle cve@mitre.org
- CVE-Watchlists
- Unerledigt
Xtooltech Xtool AnyScan Android Application 4.40.40 and prior uses a hardcoded cryptographic key and IV to decrypt update metadata. The key is stored as a static value within the application's code. An attacker with the ability to intercept network traffic can use this hardcoded key to decrypt, modify, and re-encrypt the update manifest, allowing them to direct the application to download a malicious update package.
Daten sind bereitgestellt durch National Vulnerability Database (NVD)
Xtooltech ≫ Xtool Anyscan SwPlatformandroid Version <= 4.40.40
| Typ | Quelle | Score | Percentile |
|---|---|---|---|
| EPSS | FIRST.org | 0.03% | 0.06 |
| Quelle | Base Score | Exploit Score | Impact Score | Vector String |
|---|---|---|---|---|
| 134c704f-9b21-4f2e-91b3-4a467353bcc0 | 4.6 | 2.1 | 2.5 |
CVSS:3.1/AV:N/AC:L/PR:L/UI:R/S:U/C:L/I:L/A:N
|
CWE-798 Use of Hard-coded Credentials
The product contains hard-coded credentials, such as a password or cryptographic key.