Description

An issue was discovered on COROS PACE 3 devices through 3.0808.0. It implements a function to connect the watch to a WLAN. This function is mainly for downloading firmware files. Before downloading firmware files, the watch requests some information about the firmware via HTTPS from the back-end API. However, the X.509 server certificate within the TLS handshake is not validated by the device. This allows an attacker within an active machine-in-the-middle position, using a TLS proxy and a self-signed certificate, to eavesdrop and manipulate the HTTPS communication. This could be abused, for example, for stealing the API access token of the assigned user account.

INFO

Published Date :

2025-06-20T00:00:00.000Z

Last Modified :

2025-06-20T14:49:41.270Z

Source :

mitre
AFFECTED PRODUCTS

The following products are affected by CVE-2025-32878 vulnerability.

Vendors Products
Yftech
  • Coros Pace 3
  • Coros Pace 3 Firmware
REFERENCES

CVSS Vulnerability Scoring System

Detailed values of each vector for above chart.
Attack Vector
Attack Complexity
Privileges Required
User Interaction
Scope
Confidentiality Impact
Integrity Impact
Availability Impact