CVE-2025-63434
BaseFortify
Publication date: 2025-11-24
Last updated on: 2025-11-28
Assigner: MITRE
Description
Description
CVSS Scores
EPSS Scores
| Probability: | |
| Percentile: |
Meta Information
Affected Vendors & Products
| Vendor | Product | Version / Range |
|---|---|---|
| xtooltech | xtool_anyscan | to 4.40.40 (inc) |
Helpful Resources
Exploitability
| CWE ID | Description |
|---|---|
| CWE-494 | The product downloads source code or an executable from a remote location and executes the code without sufficiently verifying the origin and integrity of the code. |
Attack-Flow Graph
AI Powered Q&A
Can you explain this vulnerability to me?
The vulnerability exists in the update mechanism of the Xtooltech Xtool AnyScan Android Application version 4.40.40 and earlier. The app downloads and extracts update packages containing executable code without verifying their integrity or authenticity using cryptographic checks. This allows an attacker who can manipulate the update metadata to deliver a malicious package that the app will accept, extract, and execute, resulting in arbitrary code execution.
How can this vulnerability impact me? :
This vulnerability can allow an attacker to execute arbitrary code on your device by delivering a malicious update package. This could lead to unauthorized control over the application or device, potentially compromising data, privacy, and device functionality.
What immediate steps should I take to mitigate this vulnerability?
To mitigate this vulnerability, avoid using the update mechanism of Xtooltech Xtool AnyScan Android Application versions 4.40.40 and prior until a secure update is provided. Do not install updates from untrusted sources or networks where an attacker could control update metadata. Monitor for updates from the vendor that address the integrity and authenticity verification of update packages.