An issue was discovered on COROS PACE 3 devices through 3.0808.0. It identifies itself as a device without input or output capabilities, which results in the use of the Just Works pairing method. This method does not implement any authentication, which therefore allows machine-in-the-middle attacks. Furthermore, this lack of authentication allows attackers to interact with the device via BLE without requiring prior authorization.
Advisories
Source ID Title
EUVD EUVD EUVD-2025-18743 An issue was discovered on COROS PACE 3 devices through 3.0808.0. It identifies itself as a device without input or output capabilities, which results in the use of the Just Works pairing method. This method does not implement any authentication, which therefore allows machine-in-the-middle attacks. Furthermore, this lack of authentication allows attackers to interact with the device via BLE without requiring prior authorization.
Fixes

Solution

No solution given by the vendor.


Workaround

No workaround given by the vendor.

History

Tue, 15 Jul 2025 13:45:00 +0000

Type Values Removed Values Added
Metrics epss

{'score': 0.0019}

epss

{'score': 0.0025}


Tue, 08 Jul 2025 15:00:00 +0000

Type Values Removed Values Added
First Time appeared Yftech
Yftech coros Pace 3
Yftech coros Pace 3 Firmware
CPEs cpe:2.3:h:yftech:coros_pace_3:-:*:*:*:*:*:*:*
cpe:2.3:o:yftech:coros_pace_3_firmware:*:*:*:*:*:*:*:*
Vendors & Products Yftech
Yftech coros Pace 3
Yftech coros Pace 3 Firmware

Tue, 24 Jun 2025 16:15:00 +0000

Type Values Removed Values Added
Weaknesses CWE-287
Metrics cvssV3_1

{'score': 9.8, 'vector': 'CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H'}

ssvc

{'options': {'Automatable': 'yes', 'Exploitation': 'poc', 'Technical Impact': 'total'}, 'version': '2.0.3'}


Fri, 20 Jun 2025 14:00:00 +0000

Type Values Removed Values Added
Description An issue was discovered on COROS PACE 3 devices through 3.0808.0. It identifies itself as a device without input or output capabilities, which results in the use of the Just Works pairing method. This method does not implement any authentication, which therefore allows machine-in-the-middle attacks. Furthermore, this lack of authentication allows attackers to interact with the device via BLE without requiring prior authorization.
References

cve-icon MITRE

Status: PUBLISHED

Assigner: mitre

Published:

Updated: 2025-06-24T15:26:31.831Z

Reserved: 2025-04-11T00:00:00.000Z

Link: CVE-2025-32877

cve-icon Vulnrichment

Updated: 2025-06-24T13:49:45.996Z

cve-icon NVD

Status : Analyzed

Published: 2025-06-20T14:15:28.250

Modified: 2025-07-08T14:32:52.860

Link: CVE-2025-32877

cve-icon Redhat

No data.

cve-icon OpenCVE Enrichment

No data.