Логотип exploitDog
Консоль
Логотип exploitDog

exploitDog

nvd логотип

CVE-2025-32878

Опубликовано: 20 июн. 2025
Источник: nvd
CVSS3: 9.8
EPSS Низкий

Описание

An issue was discovered on COROS PACE 3 devices through 3.0808.0. It implements a function to connect the watch to a WLAN. This function is mainly for downloading firmware files. Before downloading firmware files, the watch requests some information about the firmware via HTTPS from the back-end API. However, the X.509 server certificate within the TLS handshake is not validated by the device. This allows an attacker within an active machine-in-the-middle position, using a TLS proxy and a self-signed certificate, to eavesdrop and manipulate the HTTPS communication. This could be abused, for example, for stealing the API access token of the assigned user account.

Уязвимые конфигурации

Конфигурация 1

Одновременно

cpe:2.3:o:yftech:coros_pace_3_firmware:*:*:*:*:*:*:*:*
Версия до 3.0808.0 (включая)
cpe:2.3:h:yftech:coros_pace_3:-:*:*:*:*:*:*:*

EPSS

Процентиль: 17%
0.00055
Низкий

9.8 Critical

CVSS3

Дефекты

CWE-295

Связанные уязвимости

CVSS3: 9.8
github
8 месяцев назад

An issue was discovered on COROS PACE 3 devices through 3.0808.0. It implements a function to connect the watch to a WLAN. This function is mainly for downloading firmware files. Before downloading firmware files, the watch requests some information about the firmware via HTTPS from the back-end API. However, the X.509 server certificate within the TLS handshake is not validated by the device. This allows an attacker within an active machine-in-the-middle position, using a TLS proxy and a self-signed certificate, to eavesdrop and manipulate the HTTPS communication. This could be abused, for example, for stealing the API access token of the assigned user account.

EPSS

Процентиль: 17%
0.00055
Низкий

9.8 Critical

CVSS3

Дефекты

CWE-295