Trane

Tracer Sc Firmware

7 Schwachstellen gefunden.

Hinweis: Diese Liste kann unvollständig sein. Daten werden ohne Gewähr im Ursprungsformat bereitgestellt.
  • EPSS 0.05%
  • Veröffentlicht 12.03.2026 17:34:56
  • Zuletzt bearbeitet 27.03.2026 16:25:57

A Use of Hard-coded, Security-relevant Constants vulnerability in Trane Tracer SC, Tracer SC+, and Tracer Concierge could allow an attacker to disclose sensitive information and take over accounts.

  • EPSS 0.05%
  • Veröffentlicht 12.03.2026 17:33:29
  • Zuletzt bearbeitet 27.03.2026 16:25:05

A Use of Hard-coded Credentials vulnerability in Trane Tracer SC, Tracer SC+, and Tracer Concierge could allow an attacker to disclose sensitive information and take over accounts.

  • EPSS 0.04%
  • Veröffentlicht 12.03.2026 17:29:56
  • Zuletzt bearbeitet 27.03.2026 16:24:39

A Missing Authorization vulnerability in Trane Tracer SC, Tracer SC+, and Tracer Concierge could allow an unauthenticated attacker to access sensitive information through unprotected APIs.

  • EPSS 0.06%
  • Veröffentlicht 12.03.2026 17:27:03
  • Zuletzt bearbeitet 27.03.2026 16:24:06

A Memory Allocation with Excessive Size Value vulnerability in Trane Tracer SC, Tracer SC+, and Tracer Concierge could allow an unauthenticated attacker to cause a denial-of-service condition

  • EPSS 0.03%
  • Veröffentlicht 12.03.2026 17:24:04
  • Zuletzt bearbeitet 27.03.2026 16:22:41

A Use of a Broken or Risky Cryptographic Algorithm vulnerability in Trane Tracer SC, Tracer SC+, and Tracer Concierge could allow an attacker to bypass authentication and gain root-level access to the device.

  • EPSS 0.28%
  • Veröffentlicht 27.10.2021 01:15:07
  • Zuletzt bearbeitet 21.11.2024 06:17:07

The affected controllers do not properly sanitize the input containing code syntax. As a result, an attacker could craft code to alter the intended controller flow of the software.

  • EPSS 0.3%
  • Veröffentlicht 22.10.2021 14:15:08
  • Zuletzt bearbeitet 21.11.2024 06:27:45

The affected product’s web application does not properly neutralize the input during webpage generation, which could allow an attacker to inject code in the input forms.