Xtooltech Xtool AnyScan Android Application 4.40.40 and...
Moderate severity
Unreviewed
Published
Nov 24, 2025
to the GitHub Advisory Database
•
Updated Nov 24, 2025
Description
Published by the National Vulnerability Database
Nov 24, 2025
Published to the GitHub Advisory Database
Nov 24, 2025
Last updated
Nov 24, 2025
Xtooltech Xtool AnyScan Android Application 4.40.40 and prior uses a hardcoded cryptographic key and IV to decrypt update metadata. The key is stored as a static value within the application's code. An attacker with the ability to intercept network traffic can use this hardcoded key to decrypt, modify, and re-encrypt the update manifest, allowing them to direct the application to download a malicious update package.
References