Exposed: Coros Users Face Hijack Risk from Bluetooth Flaw
via: @Aidstation, thank you
A recent security analysis of the COROS PACE 3 sports watch by the SySS security company has unveiled several significant Bluetooth vulnerabilities, raising serious concerns about your data and device integrity. The findings suggest that COROS’s implementation of Bluetooth security rates highly on the “not good” scale, particularly impacting those on the Android platform, and has led to a community outcry on Reddit for immediate action. While COROS has reportedly communicated with the security researchers, some identified issues remain, and there are no plans for a fix. Indeed, COROS explicitly states that it has no plan to resolve this issue.

Wide Range of Attack Scenarios The SySS analysis, titled “Watch Out! Bluetooth Analysis of the COROS PACE 3,” highlighted multiple critical vulnerabilities that allow an unauthenticated attacker within Bluetooth range to perform various malicious actions. These include:
- Hijacking the victim’s COROS account and accessing all data. This is especially concerning as sensitive user data, including API keys (
accessToken) are transmitted from the phone to the watch every time it connects. An attacker can emulate a fake COROS watch to steal this API key, gaining access to profile and activity data. Of course, some Coros owners don’t care about others seeing personal fitness data, but others do. - Eavesdropping on sensitive data, such as notifications. The watch displays notifications from apps like WhatsApp or iMessage, and their content can be sniffed due to unencrypted communication.
- Manipulating the device configuration. Attackers can reconstruct message structures like the “Do not Disturb” (DnD) function and inject commands to alter watch settings.
- Factory resetting the device. An attacker can remotely trigger a factory reset, causing the watch to restart with default settings and potentially lose all recorded activity data. This can be particularly disruptive during a race.
- Crashing the device. Specific data payloads can cause the watch to crash and immediately reboot, even during an ongoing activity, leading to complete data loss. These crashes stem from vulnerabilities like a NULL pointer dereference (CWE-476) and an out-of-bounds read (CWE-125).
- Interrupting a running activity and forcing the recorded data to be lost.
all the negatives, Coros Pace 3 Review ❌ don’t upgrade, consider for a first time buy ✔️
Fundamental Flaws in Bluetooth Implementation. The root cause of these issues lies in fundamental security omissions in the COROS PACE 3’s Bluetooth Low Energy (BLE) implementation. The watch allows access to all exposed characteristics without requiring the connecting device to be paired or bonded whenever it is not connected to its paired mobile phone. This creates an easily exploitable attack surface in public environments.
The COROS PACE 3 also identifies itself as having no I/O capabilities, which forces the use of the insecure “Just Works” pairing method. This method offers no protection against adversary-in-the-middle (AITM) attacks. Furthermore, the watch does not support “Bluetooth Secure Connections,” a more secure pairing method introduced in Bluetooth 4.2, instead falling back to older, less secure legacy pairing based on Short-Term Keys (STK).
Disparate Security for iOS and Android Users. A critical distinction in security posture was observed between the COROS iOS and Android applications.
- When an iOS device initiates setup, the watch triggers a BLE pairing process. However, an attacker can silently bypass or downgrade this process, leading to unencrypted communication. The security of BLE communication with iOS devices is thus dependent on the integrity of the initial pairing.
- In stark contrast, when an Android device is used, the watch completely skips the pairing and bonding step; no authentication request (
AuthReq) is sent. This means communication between the Android app and the watch is neither encrypted nor authenticated. Consequently, an attacker does not need to be present during the initial setup, as any ongoing BLE connection can be intercepted, sniffed, or tampered with, making attacks far more practical and difficult to detect. This behaviour is likely due to iOS enforcing bonding for Bluetooth notifications at the operating system level, a restriction that doesn’t exist in the same form on Android. Even if the COROS PACE 3 is manually paired on an Android device using third-party tools, the official COROS app continues to communicate unencrypted.
Coros New Feature: Remote Initiated Factory Reset of your watch by someone else…literally
COROS’s Response: An Unsettling Reality According to a Reddit user, the reporter who published the security analysis contacted COROS and conversed with them. While some vulnerabilities were given timelines for resolution (some “this month,” others “end of year”), one vulnerability has no plan for a fix. This revelation fuels the concern that COROS may disregard specific critical security flaws, particularly given the severity of potential account takeovers and data loss. Users on Reddit have expressed significant alarm, with one remarking, “Lol, so there is no security at all (when you’re using an Android phone)? Everyone in Bluetooth range can hijack your COROS account, get access to all your activities, and do everything with the watch you could do from the companion app”. Another user suggested that COROS implement an option to disable Bluetooth, a feature already in some Garmin watches.

The SySS security company reported all found vulnerabilities to COROS through their responsible disclosure program. At the time of the publication of their analysis, “not all vulnerabilities have been resolved”. This situation leaves many COROS PACE 3 users, especially Android users, vulnerable to significant security risks.
Take Out
These are significant security vulnerabilities. I would suspect that the different methods required to implement Bluetooth on iOS vs Android meant the company must have been partially aware of some of these issues for some time and has done nothing about it.
The Bluetooth stack is largely shared across our watches, so these vulnerabilities apply broadly to most COROS devices. [L. Wu CEO, via dcrainmaker]
Many of us, me included, might scoff, “I don’t care if someone gets my heart rate data“. However, these vulnerabilities go significantly beyond that. A malicious actor could crash devices at large events, or another malicious actor could spy on your messages and notifications. I very strongly suspect that many of us who don’t mind others seeing our sports data DO mind about our message being snooped on.
…we were initially notified earlier this year (around 82 days ago)…I have to admit the priority should have been higher. [L. Wu CEO, via dcrainmaker]
In my opinion, this ‘just make it work’ type of implementation is found in other areas of the Coros ecosystem. You have to question if your ‘Training Readiness’ or any of the different insights have been ‘made to work’ without considering doing it correctly.
C’mon, coros, get your act together.
Sources:
- Researcher: Moritz Abrel, Syss
- Original Report: syss.com
Last Updated on 29 January 2026 by the5krunner

tfk is the founder and author of the5krunner, an independent endurance sports technology publication. With 20 years of hands-on testing of GPS watches and wearables, and competing in triathlons at an international age-group level, tfk provides in-depth expert analysis of fitness technology for serious athletes and endurance sport competitors.


Less shocked there was a security flaw (it happens) – more shocked at their response, or lack thereof.
I fully agree with you.
I wonder: if the flaws had not been discovered, would they ever have fixed them (assuming they were aware of their existence…)? To think wrong is a sin, but it is often right!
I suspect they knew about some (because of the different iOS/Android requirements and implementations) but didn’t know about others.
with the advent of secure Bluetooth connection requirements, several sports tech and smart tech companies MUST be looking a this area in general, espeically arising from the publicity of that feature of dcrainmaker and other sites.
this then begs the question. “Is coros just the tip of the iceberg?”. I’d imagine Google and Apple have this 100% underhand but the other, samller companies…less so!
I am in no way saying this is okay, but it does seem for a recreational runner that has never used notifications on a watch there is little concern out there. Especially if I do not do many races. Western States being this last weekend and having so so many Coros’ in the field that would have seemed to be the perfect time to do something if someone was going to do it.
The part I did not understand is does the bad actor have to be physically present to exploit the issue or can they be launched remotely?
I know we live in very interesing times, but I am not sure babys and bathwater are the answer.
As Ray says in the article, this will be a before and after moment for Coros.
Glad I snuck this out before Ray!
Yes, as I say above
1. simply as a sports-only device it probably doesn’t matter for most of us
2. for a serious sports event then there is either hacking by a competitor (cycling) or stopping the device from working
3. more on the SMART side of things, it really comes down to truly personal stuff being exposed which I assume most people who use such notifications would take issue with. i could be wrong
Hackers are not interested in your VO2max. They want to know when you do your long run and leave the house unattended. If you are kind of rich or famous, they want to know your courses where they can catch you. If you are in the military or something, they want to know where you are deployed etc… There’s so much more information in your fitness data….
In addition, otherwise useless data and currently-believed-useless data both gain additional value when overlaid on other stolen/bought data sources and when looked at with long timelines.
Anyone who is dismissing the implications of data leaks isn’t considering a long enough timeline. The larger your footprint the larger your exposure, period, even if the eventual attack method hasn’t been invented yet.