Description

An issue was discovered on COROS PACE 3 devices through 3.0808.0. The BLE implementation of the COROS smartwatch does not support LE Secure Connections and instead enforces BLE Legacy Pairing. In BLE Legacy Pairing, the Short-Term Key (STK) can be easily guessed. This requires knowledge of the Temporary Key (TK), which, in the case of the COROS Pace 3, is set to 0 due to the Just Works pairing method. An attacker within Bluetooth range can therefore perform sniffing attacks, allowing eavesdropping on the communication.

INFO

Published Date :

2025-06-20T00:00:00.000Z

Last Modified :

2025-06-24T15:27:06.224Z

Source :

mitre
AFFECTED PRODUCTS

The following products are affected by CVE-2025-32876 vulnerability.

Vendors Products
Yftech
  • Coros Pace 3
  • Coros Pace 3 Firmware
REFERENCES

CVSS Vulnerability Scoring System

Detailed values of each vector for above chart.
Attack Vector
Attack Complexity
Privileges Required
User Interaction
Scope
Confidentiality Impact
Integrity Impact
Availability Impact