CVE-2025-32877
📋 TL;DR
COROS PACE 3 smartwatches through firmware version 3.0808.0 incorrectly identify themselves as devices without input/output capabilities, forcing Bluetooth Low Energy (BLE) pairing to use the 'Just Works' method that lacks authentication. This allows attackers to perform machine-in-the-middle attacks and interact with the device via BLE without authorization. All users of affected COROS PACE 3 devices are vulnerable.
💻 Affected Systems
- COROS PACE 3
📦 What is this software?
⚠️ Risk & Real-World Impact
Worst Case
Attackers could intercept and manipulate all BLE communications, potentially accessing sensitive health/fitness data, injecting malicious commands, or compromising device functionality.
Likely Case
Attackers within BLE range could eavesdrop on device communications, access personal data, or send unauthorized commands to the device.
If Mitigated
With proper controls like disabling BLE when not needed or using physical isolation, risk is limited to specific attack windows.
🎯 Exploit Status
Exploitation requires physical proximity (BLE range) and basic BLE attack tools. The vulnerability is well-documented in public advisories.
🛠️ Fix & Mitigation
✅ Official Fix
Patch Version: Check COROS support for latest firmware
Vendor Advisory: https://support.coros.com/hc/en-us/articles/20087694119828-COROS-PACE-3-Release-Notes
Restart Required: Yes
Instructions:
1. Open COROS app on paired smartphone. 2. Navigate to device settings. 3. Check for firmware updates. 4. Install available update. 5. Device will restart automatically.
🔧 Temporary Workarounds
Disable BLE when not in use
allTurn off Bluetooth on the device to prevent BLE connections entirely
Use physical isolation
allKeep device in secure location when not actively using BLE features
🧯 If You Can't Patch
- Keep device in airplane mode or disable Bluetooth completely
- Only enable BLE in trusted, controlled environments
🔍 How to Verify
Check if Vulnerable:
Check device firmware version in COROS app settings. If version is 3.0808.0 or earlier, device is vulnerable.
Check Version:
Check via COROS app: Device Settings > About > Firmware Version
Verify Fix Applied:
After updating, verify firmware version is newer than 3.0808.0 in device settings.
📡 Detection & Monitoring
Log Indicators:
- Unusual BLE connection attempts
- Multiple failed pairing attempts from unknown devices
Network Indicators:
- Unexpected BLE traffic patterns
- BLE connections from unauthorized MAC addresses
SIEM Query:
Not applicable for consumer wearable devices