An issue was discovered on COROS PACE 3 devices through 3.0808.0. It implements a function to connect the watch to a WLAN. This function is mainly for downloading firmware files. Before downloading firmware files, the watch requests some information about the firmware via HTTPS from the back-end API. However, the X.509 server certificate within the TLS handshake is not validated by the device. This allows an attacker within an active machine-in-the-middle position, using a TLS proxy and a self-signed certificate, to eavesdrop and manipulate the HTTPS communication. This could be abused, for example, for stealing the API access token of the assigned user account.
Metrics
Affected Vendors & Products
References
History
Tue, 08 Jul 2025 15:00:00 +0000
Type | Values Removed | Values Added |
---|---|---|
First Time appeared |
Yftech
Yftech coros Pace 3 Yftech coros Pace 3 Firmware |
|
CPEs | cpe:2.3:h:yftech:coros_pace_3:-:*:*:*:*:*:*:* cpe:2.3:o:yftech:coros_pace_3_firmware:*:*:*:*:*:*:*:* |
|
Vendors & Products |
Yftech
Yftech coros Pace 3 Yftech coros Pace 3 Firmware |
Fri, 20 Jun 2025 15:15:00 +0000
Type | Values Removed | Values Added |
---|---|---|
Weaknesses | CWE-295 | |
Metrics |
cvssV3_1
|
Fri, 20 Jun 2025 13:45:00 +0000
Type | Values Removed | Values Added |
---|---|---|
Description | An issue was discovered on COROS PACE 3 devices through 3.0808.0. It implements a function to connect the watch to a WLAN. This function is mainly for downloading firmware files. Before downloading firmware files, the watch requests some information about the firmware via HTTPS from the back-end API. However, the X.509 server certificate within the TLS handshake is not validated by the device. This allows an attacker within an active machine-in-the-middle position, using a TLS proxy and a self-signed certificate, to eavesdrop and manipulate the HTTPS communication. This could be abused, for example, for stealing the API access token of the assigned user account. | |
References |
|

Status: PUBLISHED
Assigner: mitre
Published:
Updated: 2025-06-20T14:49:41.270Z
Reserved: 2025-04-11T00:00:00.000Z
Link: CVE-2025-32878

Updated: 2025-06-20T14:47:55.198Z

Status : Analyzed
Published: 2025-06-20T14:15:28.490
Modified: 2025-07-08T14:32:47.210
Link: CVE-2025-32878

No data.