CVE-2025-32876

medium

Description

An issue was discovered on COROS PACE 3 devices through 3.0808.0. The BLE implementation of the COROS smartwatch does not support LE Secure Connections and instead enforces BLE Legacy Pairing. In BLE Legacy Pairing, the Short-Term Key (STK) can be easily guessed. This requires knowledge of the Temporary Key (TK), which, in the case of the COROS Pace 3, is set to 0 due to the Just Works pairing method. An attacker within Bluetooth range can therefore perform sniffing attacks, allowing eavesdropping on the communication.

References

https://www.syss.de/fileadmin/dokumente/Publikationen/Advisories/SYSS-2025-023.txt

https://syss.de

https://support.coros.com/hc/en-us/articles/20087694119828-COROS-PACE-3-Release-Notes

Details

Source: Mitre, NVD

Published: 2025-06-20

Updated: 2025-07-08

Risk Information

CVSS v2

Base Score: 6.2

Vector: CVSS2#AV:A/AC:H/Au:N/C:C/I:C/A:N

Severity: Medium

CVSS v3

Base Score: 6.8

Vector: CVSS:3.1/AV:A/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:N

Severity: Medium

EPSS

EPSS: 0.00017