A Use of a Broken or Risky Cryptographic Algorithm vulnerability in Trane Tracer SC, Tracer SC+, and Tracer Concierge could allow an attacker to bypass authentication and gain root-level access to the device.
References
| Link | Resource |
|---|---|
| https://www.cisa.gov/news-events/ics-advisories/icsa-26-071-01 | Third Party Advisory US Government Resource |
Configurations
Configuration 1 (hide)
| AND |
|
Configuration 2 (hide)
| AND |
|
Configuration 3 (hide)
|
History
No history.
Information
Published : 2026-03-12 18:16
Updated : 2026-03-27 16:22
NVD link : CVE-2026-28252
Mitre link : CVE-2026-28252
CVE.ORG link : CVE-2026-28252
JSON object : View
Products Affected
trane
- tracer_concierge
- tracer_sc\+
- tracer_sc\+_firmware
- tracer_sc
- tracer_sc_firmware
CWE
CWE-327
Use of a Broken or Risky Cryptographic Algorithm
