An issue was discovered on COROS PACE 3 devices through 3.0808.0. It implements a function to connect the watch to a WLAN. This function is mainly for downloading firmware files. Before downloading firmware files, the watch requests some information about the firmware via HTTPS from the back-end API. However, the X.509 server certificate within the TLS handshake is not validated by the device. This allows an attacker within an active machine-in-the-middle position, using a TLS proxy and a self-signed certificate, to eavesdrop and manipulate the HTTPS communication. This could be abused, for example, for stealing the API access token of the assigned user account.
History

Tue, 08 Jul 2025 15:00:00 +0000

Type Values Removed Values Added
First Time appeared Yftech
Yftech coros Pace 3
Yftech coros Pace 3 Firmware
CPEs cpe:2.3:h:yftech:coros_pace_3:-:*:*:*:*:*:*:*
cpe:2.3:o:yftech:coros_pace_3_firmware:*:*:*:*:*:*:*:*
Vendors & Products Yftech
Yftech coros Pace 3
Yftech coros Pace 3 Firmware

Fri, 20 Jun 2025 15:15:00 +0000

Type Values Removed Values Added
Weaknesses CWE-295
Metrics cvssV3_1

{'score': 9.8, 'vector': 'CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H'}

ssvc

{'options': {'Automatable': 'yes', 'Exploitation': 'poc', 'Technical Impact': 'total'}, 'version': '2.0.3'}


Fri, 20 Jun 2025 13:45:00 +0000

Type Values Removed Values Added
Description An issue was discovered on COROS PACE 3 devices through 3.0808.0. It implements a function to connect the watch to a WLAN. This function is mainly for downloading firmware files. Before downloading firmware files, the watch requests some information about the firmware via HTTPS from the back-end API. However, the X.509 server certificate within the TLS handshake is not validated by the device. This allows an attacker within an active machine-in-the-middle position, using a TLS proxy and a self-signed certificate, to eavesdrop and manipulate the HTTPS communication. This could be abused, for example, for stealing the API access token of the assigned user account.
References

cve-icon MITRE

Status: PUBLISHED

Assigner: mitre

Published:

Updated: 2025-06-20T14:49:41.270Z

Reserved: 2025-04-11T00:00:00.000Z

Link: CVE-2025-32878

cve-icon Vulnrichment

Updated: 2025-06-20T14:47:55.198Z

cve-icon NVD

Status : Analyzed

Published: 2025-06-20T14:15:28.490

Modified: 2025-07-08T14:32:47.210

Link: CVE-2025-32878

cve-icon Redhat

No data.