PatchSiren

PatchSiren cyber security CVE debrief

CVE-2026-28256 Trane CVE debrief

CVE-2026-28256 is a Trane advisory for Tracer SC, Tracer SC+, and Tracer Concierge involving hard-coded, security-relevant constants. CISA says the issue could let an attacker disclose sensitive information and take over accounts. The provided advisory metadata lists affected version cutoffs for Tracer SC (<4.4_SP7) and Tracer SC+ (<6.3.2310).

Vendor
Trane
Product
Tracer SC
CVSS
MEDIUM 5.8
CISA KEV
Not listed in stored evidence
Original CVE published
2026-03-12
Original CVE updated
2026-03-12
Advisory published
2026-03-12
Advisory updated
2026-03-12

Who should care

Operators, administrators, and security teams responsible for Trane Tracer SC, Tracer SC+, and Tracer Concierge in building automation / OT environments should review this promptly, especially where management access is reachable by privileged users or shared credentials are in use.

Technical summary

The vulnerability class is CWE-style hard-coded security-relevant constants: values that should be protected are embedded in the product and may be recoverable or predictable. According to the advisory description, the impact is sensitive information disclosure and account takeover. The supplied CVSS 3.1 vector (AV:N/AC:H/PR:H/UI:N/S:C/C:H/I:N/A:N) scores 5.8 (Medium), reflecting network reachability but requiring high privileges and higher attack complexity.

Defensive priority

Medium. Prioritize exposed or widely used Trane deployments, because the impact includes account takeover and sensitive data disclosure, but exploitation requires high privileges and higher complexity.

Recommended defensive actions

  • Upgrade affected Trane systems to vendor-provided fixed versions referenced in the advisory.
  • Apply the Trane-provided enhanced security controls communicated to customers.
  • Inventory all Tracer SC, Tracer SC+, and Tracer Concierge instances and confirm whether they fall below the affected version cutoffs listed in the advisory.
  • Restrict administrative access to these systems to trusted management networks and least-privilege accounts.
  • Review and rotate credentials or other secrets that may have been exposed through hard-coded constants.
  • Monitor authentication logs and account activity for unexpected access attempts or misuse.
  • Follow CISA ICS recommended practices and defense-in-depth guidance for segmentation, access control, and monitoring.

Evidence notes

All core claims come from the supplied CISA CSAF advisory metadata for ICSA-26-071-01 and the provided CVSS 3.1 vector. The advisory description states the vulnerability is a use of hard-coded, security-relevant constants that could allow information disclosure and account takeover. The metadata lists Trane Tracer SC, Tracer SC+, and Tracer Concierge, with version cutoffs shown for Tracer SC (<4.4_SP7) and Tracer SC+ (<6.3.2310). The published and modified dates are both 2026-03-12T06:00:00Z.

Official resources

CISA published the advisory and CVE record on 2026-03-12T06:00:00.000Z. The provided enrichment does not list CVE-2026-28256 in CISA KEV.