CyberAlerts is shutting down on June 30th, 2025. Thank you for your support!

CVE-2025-32878: An issue was discovered on COROS PACE 3 devices through 3.0808.0. It implements a function to connect the watch to a WLAN. This function is mainly...

Description

An issue was discovered on COROS PACE 3 devices through 3.0808.0. It implements a function to connect the watch to a WLAN. This function is mainly for downloading firmware files. Before downloading firmware files, the watch requests some information about the firmware via HTTPS from the back-end API. However, the X.509 server certificate within the TLS handshake is not validated by the device. This allows an attacker within an active machine-in-the-middle position, using a TLS proxy and a self-signed certificate, to eavesdrop and manipulate the HTTPS communication. This could be abused, for example, for stealing the API access token of the assigned user account.

Classification

CVE ID: CVE-2025-32878

Affected Products

Vendor: n/a

Product: n/a

Exploit Prediction Scoring System (EPSS)

EPSS Score: 0.03% (probability of being exploited)

EPSS Percentile: 5.93% (scored less or equal to compared to others)

EPSS Date: 2025-07-16 (when was this score calculated)

References

https://nvd.nist.gov/vuln/detail/CVE-2025-32878
https://syss.de
https://support.coros.com/hc/en-us/articles/20087694119828-COROS-PACE-3-Release-Notes
https://www.syss.de/fileadmin/dokumente/Publikationen/Advisories/SYSS-2025-030.txt

Timeline