TROYANOSYVIRUS
Back to CVEs

CVE-2025-32878

CRITICAL
9.8

Description

An issue was discovered on COROS PACE 3 devices through 3.0808.0. It implements a function to connect the watch to a WLAN. This function is mainly for downloading firmware files. Before downloading firmware files, the watch requests some information about the firmware via HTTPS from the back-end API. However, the X.509 server certificate within the TLS handshake is not validated by the device. This allows an attacker within an active machine-in-the-middle position, using a TLS proxy and a self-signed certificate, to eavesdrop and manipulate the HTTPS communication. This could be abused, for example, for stealing the API access token of the assigned user account.

CVE Details

CVSS v3.1 Score9.8
SeverityCRITICAL
CVSS VectorCVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H
Attack VectorNETWORK
ComplexityLOW
Privileges RequiredNONE
User InteractionNONE
Published6/20/2025
Last Modified7/8/2025
Sourcenvd
Honeypot Sightings0

Affected Products

yftech:coros_pace_3yftech:coros_pace_3_firmware

Weaknesses (CWE)

CWE-295

IOC Correlations

No correlations recorded

This product uses data from the NVD API but is not endorsed or certified by the NVD.