CVE-2025-69969

SRK Powertech Pvt Ltd · Pebble Prism Ultra

A lack of authentication in the BLE protocol of Pebble Prism Ultra v2.9.2 allows adjacent attackers to execute arbitrary commands, intercept data, and hijack firmware.

Executive summary

The Pebble Prism Ultra smartwatch is subject to complete unauthenticated compromise by attackers in Bluetooth range due to a total lack of authentication and authorization in its communication protocol.

Vulnerability

This vulnerability involves a complete absence of authentication and authorization mechanisms in the Bluetooth Low Energy (BLE) protocol. An unauthenticated attacker in physical proximity (adjacent) can reverse engineer the protocol to execute arbitrary commands, intercept cleartext data, and perform unauthorized firmware hijacking via Over-the-Air (OTA) services.

Business impact

The CVSS score of 9.6 reflects the extreme risk to user privacy and device integrity. An attacker can steal sensitive personal data or turn the device into a tool for further surveillance. For enterprises issuing these devices, this represents a significant data breach risk and a total loss of trust in the device's security posture.

Remediation

Immediate Action: Users should update the device firmware to a version that implements BLE pairing and encryption immediately.

Proactive Monitoring: Users should be wary of unexpected pairing requests or unusual device behavior when in public spaces.

Compensating Controls: Disable Bluetooth on the device when not in use and avoid connecting the device to corporate assets until a patch is verified.

Exploitation status

Public Exploit Available: false

Analyst recommendation

The absence of authentication in a modern BLE device is a critical failure. We recommend that organizations suspend the use of affected Pebble Prism Ultra devices for sensitive operations until the vendor provides a firmware update that enforces encrypted and authenticated communication.