A Use of a Broken or Risky Cryptographic Algorithm vulnerability in Trane Tracer SC, Tracer SC+, and Tracer Concierge could allow an attacker to bypass authentication and gain root-level access to the device.
References
| Link | Resource |
|---|---|
| https://www.cisa.gov/news-events/ics-advisories/icsa-26-071-01 | Third Party Advisory US Government Resource |
Configurations
Configuration 1 (hide)
| AND |
|
Configuration 2 (hide)
| AND |
|
Configuration 3 (hide)
|
History
27 Mar 2026, 16:22
| Type | Values Removed | Values Added |
|---|---|---|
| CVSS |
v2 : v3 : |
v2 : unknown
v3 : 9.8 |
| CPE | cpe:2.3:o:trane:tracer_sc_firmware:4.4:service_pack5:*:*:*:*:*:* cpe:2.3:o:trane:tracer_sc_firmware:4.4:service_pack3:*:*:*:*:*:* cpe:2.3:h:trane:tracer_sc:*:*:*:*:*:*:*:* cpe:2.3:o:trane:tracer_sc_firmware:4.4:service_pack2:*:*:*:*:*:* cpe:2.3:o:trane:tracer_sc_firmware:4.4:service_pack1:*:*:*:*:*:* cpe:2.3:a:trane:tracer_concierge:*:*:*:*:*:*:*:* cpe:2.3:h:trane:tracer_sc\+:*:*:*:*:*:*:*:* cpe:2.3:o:trane:tracer_sc_firmware:4.4:service_pack4:*:*:*:*:*:* cpe:2.3:o:trane:tracer_sc\+_firmware:*:*:*:*:*:*:*:* cpe:2.3:o:trane:tracer_sc_firmware:*:*:*:*:*:*:*:* cpe:2.3:o:trane:tracer_sc_firmware:4.4:service_pack6:*:*:*:*:*:* |
|
| Summary |
|
|
| First Time |
Trane tracer Sc\+ Firmware
Trane Trane tracer Sc Firmware Trane tracer Concierge Trane tracer Sc Trane tracer Sc\+ |
|
| References | () https://www.cisa.gov/news-events/ics-advisories/icsa-26-071-01 - Third Party Advisory, US Government Resource |
12 Mar 2026, 18:16
| Type | Values Removed | Values Added |
|---|---|---|
| New CVE |
Information
Published : 2026-03-12 18:16
Updated : 2026-03-27 16:22
NVD link : CVE-2026-28252
Mitre link : CVE-2026-28252
CVE.ORG link : CVE-2026-28252
JSON object : View
Products Affected
trane
- tracer_sc\+_firmware
- tracer_sc\+
- tracer_sc_firmware
- tracer_sc
- tracer_concierge
CWE
CWE-327
Use of a Broken or Risky Cryptographic Algorithm
