We use these services and cookies to improve your user experience. You may opt out if you wish, however, this may limit some features on this site.

Please see our statement on Data Privacy.

Crisp.chat (Helpdesk and Chat)

Ok

THREATINT
PUBLISHED

CVE-2025-32878



Description

An issue was discovered on COROS PACE 3 devices through 3.0808.0. It implements a function to connect the watch to a WLAN. This function is mainly for downloading firmware files. Before downloading firmware files, the watch requests some information about the firmware via HTTPS from the back-end API. However, the X.509 server certificate within the TLS handshake is not validated by the device. This allows an attacker within an active machine-in-the-middle position, using a TLS proxy and a self-signed certificate, to eavesdrop and manipulate the HTTPS communication. This could be abused, for example, for stealing the API access token of the assigned user account.

Reserved 2025-04-11 | Published 2025-06-20 | Updated 2025-06-20 | Assigner mitre

References

syss.de

support.coros.com/...087694119828-COROS-PACE-3-Release-Notes

www.syss.de/...te/Publikationen/Advisories/SYSS-2025-030.txt

cve.org (CVE-2025-32878)

nvd.nist.gov (CVE-2025-32878)

Download JSON

Share this page
https://cve.threatint.eu/CVE/CVE-2025-32878

Support options

Helpdesk Chat, Email, Knowledgebase