Description
A Memory Allocation with Excessive Size Value vulnerability in Trane Tracer SC, Tracer SC+, and Tracer Concierge could allow an unauthenticated attacker to cause a denial-of-service condition
Published: 2026-03-12
Score: 8.7 High
EPSS: < 1% Very Low
KEV: No
Impact: Denial of Service
Action: Apply patch
AI Analysis

Impact

A memory allocation error allows an attacker without authentication to force the Trane Tracer family of controllers to crash or reboot, resulting in an interruption of HVAC services. The flaw arises from an unchecked size parameter during allocation, a classic uncontrolled memory allocation weakness classified as CWE-789. An attacker who can trigger the faulty allocation can cause a denial-of-service condition that disrupts normal building climate control operations and potentially leads to occupant discomfort or equipment damage.

Affected Systems

The vulnerability affects Trane's Tracer Concierge, Tracer SC, and Tracer SC+ products. Firmware versions listed in the Common Platform Enumeration include Trane Tracer SC firmware 4.4 with service packs 1 through 6, and the corresponding Tracer SC+ firmware. The vendor has issued a fix in Tracer SC+ version v6.30.2313, which supersedes earlier releases.

Risk and Exploitability

With a CVSS score of 8.7 the flaw is considered high severity, yet the EPSS score is below 1% and the issue is not catalogued in the CISA KEV list, indicating low current exploitation probability. The vulnerability can be triggered by any entity that can reach the control interface without authentication, implying a remote network attack vector, though the description does not specify the exact channel. An attacker could exploit it to bring the system down, causing significant operational disruption.

Generated by OpenCVE AI on March 27, 2026 at 17:30 UTC.

Remediation

Vendor Solution

Trane has released the following versions of Tracer SC+ for users to upgrade to: * CVE-2026-28253: Tracer SC+ version v6.30.2313


OpenCVE Recommended Actions

  • Upgrade Tracer SC+ to version v6.30.2313
  • If upgrade cannot be performed immediately, disconnect the affected units from the network to prevent exploitation
  • Verify the firmware version to confirm it is not vulnerable before proceeding

Generated by OpenCVE AI on March 27, 2026 at 17:30 UTC.

Tracking

Sign in to view the affected projects.

Advisories

No advisories yet.

History

Fri, 27 Mar 2026 16:30:00 +0000

Type Values Removed Values Added
First Time appeared Trane tracer Sc\+
Trane tracer Sc\+ Firmware
Trane tracer Sc Firmware
CPEs cpe:2.3:a:trane:tracer_concierge:*:*:*:*:*:*:*:*
cpe:2.3:h:trane:tracer_sc:*:*:*:*:*:*:*:*
cpe:2.3:h:trane:tracer_sc\+:*:*:*:*:*:*:*:*
cpe:2.3:o:trane:tracer_sc\+_firmware:*:*:*:*:*:*:*:*
cpe:2.3:o:trane:tracer_sc_firmware:*:*:*:*:*:*:*:*
cpe:2.3:o:trane:tracer_sc_firmware:4.4:service_pack1:*:*:*:*:*:*
cpe:2.3:o:trane:tracer_sc_firmware:4.4:service_pack2:*:*:*:*:*:*
cpe:2.3:o:trane:tracer_sc_firmware:4.4:service_pack3:*:*:*:*:*:*
cpe:2.3:o:trane:tracer_sc_firmware:4.4:service_pack4:*:*:*:*:*:*
cpe:2.3:o:trane:tracer_sc_firmware:4.4:service_pack5:*:*:*:*:*:*
cpe:2.3:o:trane:tracer_sc_firmware:4.4:service_pack6:*:*:*:*:*:*
Vendors & Products Trane tracer Sc\+
Trane tracer Sc\+ Firmware
Trane tracer Sc Firmware
Metrics cvssV3_1

{'score': 7.5, 'vector': 'CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H'}


Fri, 13 Mar 2026 17:15:00 +0000

Type Values Removed Values Added
Metrics ssvc

{'options': {'Automatable': 'yes', 'Exploitation': 'none', 'Technical Impact': 'partial'}, 'version': '2.0.3'}


Fri, 13 Mar 2026 10:00:00 +0000

Type Values Removed Values Added
First Time appeared Trane
Trane tracer Concierge
Trane tracer Sc
Vendors & Products Trane
Trane tracer Concierge
Trane tracer Sc

Thu, 12 Mar 2026 17:45:00 +0000

Type Values Removed Values Added
Description A Memory Allocation with Excessive Size Value vulnerability in Trane Tracer SC, Tracer SC+, and Tracer Concierge could allow an unauthenticated attacker to cause a denial-of-service condition
Title Memory Allocation with Excessive Size Value vulnerability in Trane Tracer SC, Tracer SC+, and Tracer Concierge
Weaknesses CWE-789
References
Metrics cvssV4_0

{'score': 8.7, 'vector': 'CVSS:4.0/AV:N/AC:L/AT:N/PR:N/UI:N/VC:N/VI:H/VA:N/SC:N/SI:N/SA:N'}


Subscriptions

Trane Tracer Concierge Tracer Sc Tracer Sc\+ Tracer Sc\+ Firmware Tracer Sc Firmware
cve-icon MITRE

Status: PUBLISHED

Assigner: icscert

Published:

Updated: 2026-03-13T16:25:47.523Z

Reserved: 2026-02-25T17:06:34.954Z

Link: CVE-2026-28253

cve-icon Vulnrichment

Updated: 2026-03-13T16:25:38.350Z

cve-icon NVD

Status : Analyzed

Published: 2026-03-12T18:16:23.370

Modified: 2026-03-27T16:24:06.553

Link: CVE-2026-28253

cve-icon Redhat

No data.

cve-icon OpenCVE Enrichment

Updated: 2026-03-27T20:27:14Z

Weaknesses