CVE-2025-32877

An issue was discovered on COROS PACE 3 devices through 3.0808.0. It identifies itself as a device without input or output capabilities, which results in the use of the Just Works pairing method. This method does not implement any authentication, which therefore allows machine-in-the-middle attacks. Furthermore, this lack of authentication allows attackers to interact with the device via BLE without requiring prior authorization.
CVSS

No CVSS.

Configurations

Configuration 1 (hide)


History

08 Jul 2025, 14:32

Type Values Removed Values Added
First Time Yftech
Yftech coros Pace 3
Yftech coros Pace 3 Firmware
CPE cpe:2.3:o:yftech:coros_pace_3_firmware:*:*:*:*:*:*:*:*
cpe:2.3:h:yftech:coros_pace_3:-:*:*:*:*:*:*:*
References () https://support.coros.com/hc/en-us/articles/20087694119828-COROS-PACE-3-Release-Notes - () https://support.coros.com/hc/en-us/articles/20087694119828-COROS-PACE-3-Release-Notes - Release Notes
References () https://www.syss.de/fileadmin/dokumente/Publikationen/Advisories/SYSS-2025-024.txt - () https://www.syss.de/fileadmin/dokumente/Publikationen/Advisories/SYSS-2025-024.txt - Exploit, Third Party Advisory
References () https://syss.de - () https://syss.de - Third Party Advisory

20 Jun 2025, 14:15

Type Values Removed Values Added
New CVE

Information

Published : 2025-06-20 14:15

Updated : 2025-07-08 14:32


NVD link : CVE-2025-32877

Mitre link : CVE-2025-32877


JSON object : View

Products Affected

yftech

  • coros_pace_3_firmware
  • coros_pace_3
CWE

No CWE.