Analysis and contextual insights are available on OpenCVE Cloud.
No vendor fix or workaround currently provided.
Additional remediation guidance may be available on OpenCVE Cloud.
Tracking
Sign in to view the affected projects.
| Source | ID | Title |
|---|---|---|
EUVD |
EUVD-2025-18742 | An issue was discovered on COROS PACE 3 devices through 3.0808.0. It implements a function to connect the watch to a WLAN. With WLAN access, the COROS Pace 3 downloads firmware files via HTTP. However, the communication is not encrypted and allows sniffing and machine-in-the-middle attacks. |
Tue, 08 Jul 2025 15:00:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| First Time appeared |
Yftech
Yftech coros Pace 3 Yftech coros Pace 3 Firmware |
|
| CPEs | cpe:2.3:h:yftech:coros_pace_3:-:*:*:*:*:*:*:* cpe:2.3:o:yftech:coros_pace_3_firmware:*:*:*:*:*:*:*:* |
|
| Vendors & Products |
Yftech
Yftech coros Pace 3 Yftech coros Pace 3 Firmware |
Tue, 24 Jun 2025 16:15:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| Weaknesses | CWE-319 | |
| Metrics |
cvssV3_1
|
Fri, 20 Jun 2025 14:00:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| Description | An issue was discovered on COROS PACE 3 devices through 3.0808.0. It implements a function to connect the watch to a WLAN. With WLAN access, the COROS Pace 3 downloads firmware files via HTTP. However, the communication is not encrypted and allows sniffing and machine-in-the-middle attacks. | |
| References |
|
Status: PUBLISHED
Assigner: mitre
Published:
Updated: 2025-06-24T15:27:48.896Z
Reserved: 2025-04-11T00:00:00.000Z
Link: CVE-2025-32880
Updated: 2025-06-24T13:49:36.538Z
Status : Analyzed
Published: 2025-06-20T14:15:28.967
Modified: 2025-07-08T14:32:32.310
Link: CVE-2025-32880
No data.
OpenCVE Enrichment
No data.
EUVD