{"id":"CVE-2025-63433","details":"Xtooltech Xtool AnyScan Android Application 4.40.40 and prior uses a hardcoded cryptographic key and IV to decrypt update metadata. The key is stored as a static value within the application's code. An attacker with the ability to intercept network traffic can use this hardcoded key to decrypt, modify, and re-encrypt the update manifest, allowing them to direct the application to download a malicious update package.","modified":"2026-04-10T05:33:29.914075Z","published":"2025-11-24T17:16:07.787Z","references":[{"type":"ADVISORY","url":"https://github.com/ab3lson/cve-references/tree/master/CVE-2025-63433"},{"type":"EVIDENCE","url":"https://www.nowsecure.com/blog/2025/07/16/remote-code-execution-discovered-in-xtool-anyscan-app-risks-to-phones-and-vehicles/"}],"affected":[{"database_specific":{"unresolved_ranges":[{"events":[{"introduced":"0"},{"last_affected":"4.40.40"}]}],"source":"https://storage.googleapis.com/cve-osv-conversion/osv-output/CVE-2025-63433.json"}}],"schema_version":"1.7.5","severity":[{"type":"CVSS_V3","score":"CVSS:3.1/AV:N/AC:L/PR:L/UI:R/S:U/C:L/I:L/A:N"}]}