An issue was discovered on COROS PACE 3 devices through 3.0808.0. It identifies itself as a device without input or output capabilities, which results in the use of the Just Works pairing method. This method does not implement any authentication, which therefore allows machine-in-the-middle attacks. Furthermore, this lack of authentication allows attackers to interact with the device via BLE without requiring prior authorization.
References
| Link | Resource |
|---|---|
| https://support.coros.com/hc/en-us/articles/20087694119828-COROS-PACE-3-Release-Notes | Release Notes |
| https://syss.de | Third Party Advisory |
| https://www.syss.de/fileadmin/dokumente/Publikationen/Advisories/SYSS-2025-024.txt | Exploit Third Party Advisory |
| https://www.syss.de/fileadmin/dokumente/Publikationen/Advisories/SYSS-2025-024.txt | Exploit Third Party Advisory |
Configurations
Configuration 1 (hide)
| AND |
|
History
08 Jul 2025, 14:32
| Type | Values Removed | Values Added |
|---|---|---|
| New CVE |
Information
Published : 2025-06-20 14:15
Updated : 2025-07-08 14:32
NVD link : CVE-2025-32877
Mitre link : CVE-2025-32877
CVE.ORG link : CVE-2025-32877
JSON object : View
Products Affected
yftech
- coros_pace_3_firmware
- coros_pace_3
CWE
CWE-287
Improper Authentication
