We use these services and cookies to improve your user experience. You may opt out if you wish, however, this may limit some features on this site.

Please see our statement on Data Privacy.

Crisp.chat (Helpdesk and Chat)

Ok

THREATINT
PUBLISHED

CVE-2025-32876



Description

An issue was discovered on COROS PACE 3 devices through 3.0808.0. The BLE implementation of the COROS smartwatch does not support LE Secure Connections and instead enforces BLE Legacy Pairing. In BLE Legacy Pairing, the Short-Term Key (STK) can be easily guessed. This requires knowledge of the Temporary Key (TK), which, in the case of the COROS Pace 3, is set to 0 due to the Just Works pairing method. An attacker within Bluetooth range can therefore perform sniffing attacks, allowing eavesdropping on the communication.

Reserved 2025-04-11 | Published 2025-06-20 | Updated 2025-06-20 | Assigner mitre

References

syss.de

support.coros.com/...087694119828-COROS-PACE-3-Release-Notes

www.syss.de/...te/Publikationen/Advisories/SYSS-2025-023.txt

cve.org (CVE-2025-32876)

nvd.nist.gov (CVE-2025-32876)

Download JSON

Share this page
https://cve.threatint.eu/CVE/CVE-2025-32876

Support options

Helpdesk Chat, Email, Knowledgebase