COROS Faces Major Security Flaws Exposing Users to Remote Attacks

Cybersecurity flaws could let nearby hackers inject messages, interrupt runs, and reset devices mid-race

COROS, the GPS watch brand beloved by endurance athletes, is now facing a massive security crisis after a German researcher publicly disclosed eight vulnerabilities that give attackers near-total access to both the companyโ€™s watches and usersโ€™ personal accounts.

The vulnerabilities, first discovered in March by cybersecurity expert Moritz Abrell of SySS GmbH, impact all COROS watches, not just the newer Pace 3 model that Abrell initially tested.

Among the exploits: attackers could hijack a userโ€™s COROS.com account, factory reset the device, manipulate settings, intercept messages sent to the watch via Bluetooth, and even interrupt or erase an activity in real-time, meaning a bad actor standing near you during a marathon could effectively crash your watch mid-race and wipe your workout data.

In a tech demo accompanying his report, Abrell showed that a fake โ€œyouโ€™re firedโ€ text message from a spoofed contact could be injected directly into a userโ€™s watch. And since these attacks are Bluetooth-based, no physical access to the device is needed.

Anyone within wireless range could carry them out.

The vulnerabilities were publicly disclosed on June 17, after COROS failed to address them during the standard 90-day grace period that security researchers typically allow for vendors to fix bugs before going public.

And while itโ€™s not uncommon for companies to need extra time, COROSโ€™s initial response, saying it wouldnโ€™t fix the bugs until the end of the year, began to raise eyebrows.

COROS Faces Major Security Flaws Exposing Users to Remote Attacks 1

A Slow Response to Serious Problems

COROSโ€™s delay didnโ€™t go unnoticed by Abrell or by Ray Maker of DC Rainmaker, who broke the story in the sports tech world after being tipped off by a reader.

Maker reached out to the company directly and, within hours, received confirmation that COROS was taking another look.

A couple days later, COROS CEO Lewis Wu responded with a long and candid email admitting the company had dropped the ball.

โ€œYouโ€™re right that we were initially notified earlier this year … but I have to admit the priority should have been higher,โ€ Wu wrote to DC Rainmaker, acknowledging that the company initially gave a vague โ€œend of 2025โ€ timeline that didnโ€™t reflect the severity of the issue.

Wu confirmed the vulnerabilities affected most COROS devices, not just the Pace 3, due to shared Bluetooth architecture across its product line.

He also outlined a two-part fix: some updates, including better authentication for device pairing, would be rolled out by the end of July. Other fixes, related to encrypted communication between watch and phone, are slated for late August, which he admitted was an โ€œaggressive goal.โ€

The full list of vulnerabilities and proof-of-concept code is now publicly available, meaning anyone with the know-how could exploit them. Thatโ€™s part of what makes the delay so serious: users are now exposed, and the attack instructions are out in the open.

COROS Faces Major Security Flaws Exposing Users to Remote Attacks 2

A Moment of Reckoning for COROS

While this isnโ€™t the first time a wearables company has faced security issues, Garminโ€™s 2020 ransomware attack famously took down its services for days, itโ€™s one of the most comprehensive and serious flaws publicly disclosed in recent memory.

The fact that the attack can be carried out wirelessly, without even touching the device, makes it particularly concerning for runners, cyclists, and triathletes who rely on their watches not just for data but for peace of mind during races and training.

โ€œThereโ€™s a before and after moment for every company when it comes to security,โ€ Maker wrote in his report. โ€œThis might be that moment for COROS.โ€

COROS appears to be treating it as such.

Wu told DC Rainmaker that the company is overhauling how it handles future security disclosures and prioritizing fixes more aggressively going forward.

But itโ€™s also clear that, until recently, the company didnโ€™t have strong processes in place to triage and escalate security issues, especially ones that should never have landed in the same support queue as, say, a bug in the sleep tracking algorithm.

For users, thereโ€™s not much to do right now except wait and install firmware updates as soon as theyโ€™re released. COROS says the first round will arrive in July, with the second wave in August. In the meantime, those worried about being targeted could disable Bluetooth on their watches in public, but realistically, most wonโ€™t.

And thatโ€™s part of what makes this such a pivotal moment for COROS.

Its watches are staples among ultrarunners and adventure athletes precisely because theyโ€™re so reliable. Now, that trust has taken a hit, not because bugs exist (they always will), but because the company waited too long to act.

COROS says itโ€™s learning from this. For the sake of its users, letโ€™s hope that lesson sticks.

Leave a Comment

This site uses Akismet to reduce spam. Learn how your comment data is processed.

Avatar photo

Jessy Carveth

Senior News Editor

Jessy has been active her whole life, competing in cross-country, track running, and soccer throughout her undergrad. She pivoted to road cycling after completing her Bachelor of Kinesiology with Nutrition from Acadia University. Jessy is currently a professional road cyclist living and training in Spain.

Want To Save This Guide For Later?

Enter your email and we'll give it over to your inbox.