Skip to main content
Press slash or control plus K to focus the search. Use the arrow keys to navigate results and press enter to open a threat.
Reconnecting to live updates…

CVE-2026-28254: CWE-862 Missing Authorization in Trane Tracer SC

0
Medium
VulnerabilityCVE-2026-28254cvecve-2026-28254cwe-862
Published: Thu Mar 12 2026 (03/12/2026, 17:29:56 UTC)
Source: CVE Database V5
Vendor/Project: Trane
Product: Tracer SC

Description

A Missing Authorization vulnerability in Trane Tracer SC, Tracer SC+, and Tracer Concierge could allow an unauthenticated attacker to access sensitive information through unprotected APIs.

AI-Powered Analysis

AILast updated: 03/12/2026, 18:00:36 UTC

Technical Analysis

CVE-2026-28254 identifies a missing authorization vulnerability (CWE-862) in Trane's Tracer SC product line, including Tracer SC, Tracer SC+, and Tracer Concierge. These products are widely used building management systems (BMS) that control HVAC, lighting, and other critical infrastructure in commercial and industrial facilities. The vulnerability arises because certain APIs within these systems do not enforce proper authorization checks, allowing unauthenticated attackers to query sensitive information remotely. The CVSS 4.0 vector (AV:N/AC:L/AT:N/PR:N/UI:N/VC:L/VI:N/VA:N/SC:L/SI:N/SA:N) indicates network attack vector, low complexity, no privileges or user interaction required, and limited confidentiality impact. The lack of authentication means attackers can exploit this flaw without credentials, potentially gathering sensitive operational data or system configuration details. Although no public exploits or patches are currently available, the exposure of sensitive information could aid further attacks or reconnaissance. The vulnerability affects all versions of the Tracer SC product line as indicated, emphasizing the need for immediate attention. The vulnerability was reserved in late February 2026 and published in March 2026 by ICS-CERT, highlighting its relevance to industrial control systems security. Given the critical role of BMS in facility operations, unauthorized data access could have operational and security implications.

Potential Impact

The primary impact of CVE-2026-28254 is unauthorized disclosure of sensitive information from Trane Tracer SC systems. This could include building operational data, system configurations, or other sensitive details that attackers could leverage for further attacks such as sabotage, espionage, or disruption. While the vulnerability does not directly allow system control or modification, the information gained could facilitate targeted attacks against critical infrastructure. Organizations relying on Trane Tracer SC for building management may face increased risk of data breaches and operational disruptions. The exposure could also affect compliance with data protection regulations if sensitive personal or operational data is leaked. The medium CVSS score reflects the moderate risk due to ease of exploitation but limited direct impact on system integrity or availability. However, in sensitive environments such as government facilities, data centers, or critical infrastructure, the impact could be more severe. The lack of authentication requirement broadens the attack surface, making remote exploitation feasible without insider access.

Mitigation Recommendations

To mitigate CVE-2026-28254, organizations should immediately implement network segmentation to isolate Trane Tracer SC systems from untrusted networks, especially the internet. Restrict API access using firewall rules or network access control lists (ACLs) to allow only trusted management stations or IP addresses. Employ intrusion detection and prevention systems (IDS/IPS) to monitor for unusual API requests or scanning activity targeting Trane systems. Engage with Trane support or vendors to obtain security advisories and patches once available, and plan for timely deployment. Consider deploying application-layer gateways or reverse proxies that enforce authentication and authorization on API endpoints as an interim control. Conduct thorough audits of existing access controls and logs to detect any unauthorized access attempts. Additionally, review and harden default configurations, disable unused services, and ensure all software components are up to date. Finally, train security teams to recognize indicators of compromise related to building management systems and incorporate these systems into broader security monitoring.

Pro Console: star threats, build custom feeds, automate alerts via Slack, email & webhooks.Upgrade to Pro

Technical Details

Data Version
5.2
Assigner Short Name
icscert
Date Reserved
2026-02-25T17:06:34.954Z
Cvss Version
4.0
State
PUBLISHED

Threat ID: 69b2fb902f860ef943d10b67

Added to database: 3/12/2026, 5:44:48 PM

Last enriched: 3/12/2026, 6:00:36 PM

Last updated: 3/12/2026, 8:21:56 PM

Views: 4

Community Reviews

0 reviews

Crowdsource mitigation strategies, share intel context, and vote on the most helpful responses. Sign in to add your voice and help keep defenders ahead.

Sort by
Loading community insights…

Want to contribute mitigation steps or threat intel context? Sign in or create an account to join the community discussion.

Actions

PRO

Updates to AI analysis require Pro Console access. Upgrade inside Console → Billing.

Please log in to the Console to use AI analysis features.

Need more coverage?

Upgrade to Pro Console in Console -> Billing for AI refresh and higher limits.

For incident response and remediation, OffSeq services can help resolve threats faster.

Latest Threats

Breach by OffSeqOFFSEQFRIENDS — 25% OFF

Check if your credentials are on the dark web

Instant breach scanning across billions of leaked records. Free tier available.

Scan now
OffSeq TrainingCredly Certified

Lead Pen Test Professional

Technical5-day eLearningPECB Accredited
View courses