CVE-2025-32876: n/a
An issue was discovered on COROS PACE 3 devices through 3.0808.0. The BLE implementation of the COROS smartwatch does not support LE Secure Connections and instead enforces BLE Legacy Pairing. In BLE Legacy Pairing, the Short-Term Key (STK) can be easily guessed. This requires knowledge of the Temporary Key (TK), which, in the case of the COROS Pace 3, is set to 0 due to the Just Works pairing method. An attacker within Bluetooth range can therefore perform sniffing attacks, allowing eavesdropping on the communication.
AI Analysis
Technical Summary
CVE-2025-32876 identifies a security vulnerability in the Bluetooth Low Energy (BLE) implementation of COROS PACE 3 smartwatches up to firmware version 3.0808.0. The core issue lies in the device's use of BLE Legacy Pairing rather than the more secure LE Secure Connections mode. BLE Legacy Pairing relies on a Short-Term Key (STK) derived from a Temporary Key (TK), which in this case is fixed to zero due to the use of the Just Works pairing method. This method does not require user interaction or authentication, making the TK trivially guessable. Consequently, an attacker within Bluetooth range can perform passive sniffing attacks to eavesdrop on the communication between the smartwatch and paired devices. This compromises the confidentiality of data transmitted over BLE, such as health metrics, notifications, or other sensitive information. The vulnerability does not require active exploitation or user interaction beyond proximity, and no authentication barriers prevent an attacker from capturing the BLE traffic. Although no known exploits have been reported in the wild, the fundamental weakness in the pairing protocol presents a significant risk to user privacy and data security. The lack of LE Secure Connections support means that the device does not benefit from the stronger cryptographic protections introduced in Bluetooth 4.2 and later standards, which mitigate passive eavesdropping risks. This vulnerability is specific to the COROS PACE 3 smartwatch and its BLE implementation, affecting all devices running vulnerable firmware versions prior to a patch or update that enables LE Secure Connections or otherwise strengthens pairing security.
Potential Impact
For European organizations, especially those in sectors where employee health and fitness data are monitored via wearables, this vulnerability poses a privacy and security risk. Sensitive personal data transmitted by the smartwatch could be intercepted by malicious actors, potentially leading to unauthorized disclosure of health information or other personal identifiers. Organizations that issue COROS PACE 3 devices to employees or integrate them into workplace wellness programs could face compliance challenges under GDPR due to the risk of data leakage. Additionally, if the smartwatch is used in conjunction with enterprise applications or paired with corporate devices, the intercepted BLE traffic might reveal contextual information about user activities or device states, which could be leveraged for targeted social engineering or further attacks. The vulnerability also raises concerns for high-profile individuals or executives using these devices in sensitive environments, where eavesdropping could facilitate espionage or surveillance. While the attack requires physical proximity (Bluetooth range), the ease of exploitation and lack of user interaction mean that attackers could discreetly capture data in public or semi-public spaces. The overall impact is primarily on confidentiality, with limited direct effect on device integrity or availability.
Mitigation Recommendations
To mitigate this vulnerability, organizations and users should prioritize updating the COROS PACE 3 firmware as soon as a patch enabling LE Secure Connections or an equivalent security enhancement is released by the vendor. Until such updates are available, users should disable Bluetooth connectivity when not actively pairing or transmitting sensitive data to minimize exposure. Employing physical security measures to limit unauthorized access within Bluetooth range, such as restricting device use in sensitive areas, can reduce risk. Additionally, organizations should consider implementing endpoint security controls that monitor and restrict Bluetooth communications on paired devices, potentially detecting anomalous scanning or sniffing activities. For environments with heightened security requirements, replacing vulnerable devices with alternatives supporting LE Secure Connections and stronger pairing methods is advisable. User education about the risks of BLE Legacy Pairing and the importance of controlling device proximity can further reduce attack surface. Finally, integrating network-level encryption or application-layer security for data transmitted to and from the smartwatch can provide defense-in-depth against eavesdropping.
Affected Countries
Germany, France, United Kingdom, Netherlands, Sweden, Switzerland, Belgium, Italy
CVE-2025-32876: n/a
Description
An issue was discovered on COROS PACE 3 devices through 3.0808.0. The BLE implementation of the COROS smartwatch does not support LE Secure Connections and instead enforces BLE Legacy Pairing. In BLE Legacy Pairing, the Short-Term Key (STK) can be easily guessed. This requires knowledge of the Temporary Key (TK), which, in the case of the COROS Pace 3, is set to 0 due to the Just Works pairing method. An attacker within Bluetooth range can therefore perform sniffing attacks, allowing eavesdropping on the communication.
AI-Powered Analysis
Technical Analysis
CVE-2025-32876 identifies a security vulnerability in the Bluetooth Low Energy (BLE) implementation of COROS PACE 3 smartwatches up to firmware version 3.0808.0. The core issue lies in the device's use of BLE Legacy Pairing rather than the more secure LE Secure Connections mode. BLE Legacy Pairing relies on a Short-Term Key (STK) derived from a Temporary Key (TK), which in this case is fixed to zero due to the use of the Just Works pairing method. This method does not require user interaction or authentication, making the TK trivially guessable. Consequently, an attacker within Bluetooth range can perform passive sniffing attacks to eavesdrop on the communication between the smartwatch and paired devices. This compromises the confidentiality of data transmitted over BLE, such as health metrics, notifications, or other sensitive information. The vulnerability does not require active exploitation or user interaction beyond proximity, and no authentication barriers prevent an attacker from capturing the BLE traffic. Although no known exploits have been reported in the wild, the fundamental weakness in the pairing protocol presents a significant risk to user privacy and data security. The lack of LE Secure Connections support means that the device does not benefit from the stronger cryptographic protections introduced in Bluetooth 4.2 and later standards, which mitigate passive eavesdropping risks. This vulnerability is specific to the COROS PACE 3 smartwatch and its BLE implementation, affecting all devices running vulnerable firmware versions prior to a patch or update that enables LE Secure Connections or otherwise strengthens pairing security.
Potential Impact
For European organizations, especially those in sectors where employee health and fitness data are monitored via wearables, this vulnerability poses a privacy and security risk. Sensitive personal data transmitted by the smartwatch could be intercepted by malicious actors, potentially leading to unauthorized disclosure of health information or other personal identifiers. Organizations that issue COROS PACE 3 devices to employees or integrate them into workplace wellness programs could face compliance challenges under GDPR due to the risk of data leakage. Additionally, if the smartwatch is used in conjunction with enterprise applications or paired with corporate devices, the intercepted BLE traffic might reveal contextual information about user activities or device states, which could be leveraged for targeted social engineering or further attacks. The vulnerability also raises concerns for high-profile individuals or executives using these devices in sensitive environments, where eavesdropping could facilitate espionage or surveillance. While the attack requires physical proximity (Bluetooth range), the ease of exploitation and lack of user interaction mean that attackers could discreetly capture data in public or semi-public spaces. The overall impact is primarily on confidentiality, with limited direct effect on device integrity or availability.
Mitigation Recommendations
To mitigate this vulnerability, organizations and users should prioritize updating the COROS PACE 3 firmware as soon as a patch enabling LE Secure Connections or an equivalent security enhancement is released by the vendor. Until such updates are available, users should disable Bluetooth connectivity when not actively pairing or transmitting sensitive data to minimize exposure. Employing physical security measures to limit unauthorized access within Bluetooth range, such as restricting device use in sensitive areas, can reduce risk. Additionally, organizations should consider implementing endpoint security controls that monitor and restrict Bluetooth communications on paired devices, potentially detecting anomalous scanning or sniffing activities. For environments with heightened security requirements, replacing vulnerable devices with alternatives supporting LE Secure Connections and stronger pairing methods is advisable. User education about the risks of BLE Legacy Pairing and the importance of controlling device proximity can further reduce attack surface. Finally, integrating network-level encryption or application-layer security for data transmitted to and from the smartwatch can provide defense-in-depth against eavesdropping.
Affected Countries
Technical Details
- Data Version
- 5.1
- Assigner Short Name
- mitre
- Date Reserved
- 2025-04-11T00:00:00.000Z
- Cvss Version
- null
- State
- PUBLISHED
Threat ID: 685566507ff74dad36a65741
Added to database: 6/20/2025, 1:46:56 PM
Last enriched: 6/20/2025, 2:03:12 PM
Last updated: 1/7/2026, 8:47:04 AM
Views: 69
Community Reviews
0 reviewsCrowdsource mitigation strategies, share intel context, and vote on the most helpful responses. Sign in to add your voice and help keep defenders ahead.
Want to contribute mitigation steps or threat intel context? Sign in or create an account to join the community discussion.
Related Threats
CVE-2025-15158: CWE-434 Unrestricted Upload of File with Dangerous Type in eastsidecode WP Enable WebP
HighCVE-2025-15018: CWE-639 Authorization Bypass Through User-Controlled Key in djanym Optional Email
CriticalCVE-2025-15000: CWE-79 Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting') in tfrommen Page Keys
MediumCVE-2025-14999: CWE-352 Cross-Site Request Forgery (CSRF) in kentothemes Latest Tabs
MediumCVE-2025-13531: CWE-79 Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting') in hayyatapps Stylish Order Form Builder
MediumActions
Updates to AI analysis require Pro Console access. Upgrade inside Console → Billing.
Need more coverage?
Upgrade to Pro Console in Console -> Billing for AI refresh and higher limits.
For incident response and remediation, OffSeq services can help resolve threats faster.