Логотип exploitDog
Консоль
Логотип exploitDog

exploitDog

github логотип

GHSA-j9pq-93r5-c843

Опубликовано: 24 нояб. 2025
Источник: github
Github: Не прошло ревью
CVSS3: 4.6

Описание

Xtooltech Xtool AnyScan Android Application 4.40.40 and prior uses a hardcoded cryptographic key and IV to decrypt update metadata. The key is stored as a static value within the application's code. An attacker with the ability to intercept network traffic can use this hardcoded key to decrypt, modify, and re-encrypt the update manifest, allowing them to direct the application to download a malicious update package.

Xtooltech Xtool AnyScan Android Application 4.40.40 and prior uses a hardcoded cryptographic key and IV to decrypt update metadata. The key is stored as a static value within the application's code. An attacker with the ability to intercept network traffic can use this hardcoded key to decrypt, modify, and re-encrypt the update manifest, allowing them to direct the application to download a malicious update package.

EPSS

Процентиль: 10%
0.00034
Низкий

4.6 Medium

CVSS3

Дефекты

CWE-798

Связанные уязвимости

CVSS3: 4.6
nvd
2 месяца назад

Xtooltech Xtool AnyScan Android Application 4.40.40 and prior uses a hardcoded cryptographic key and IV to decrypt update metadata. The key is stored as a static value within the application's code. An attacker with the ability to intercept network traffic can use this hardcoded key to decrypt, modify, and re-encrypt the update manifest, allowing them to direct the application to download a malicious update package.

EPSS

Процентиль: 10%
0.00034
Низкий

4.6 Medium

CVSS3

Дефекты

CWE-798