A Use of a Broken or Risky Cryptographic Algorithm vulnerability in Trane Tracer SC, Tracer SC+, and Tracer Concierge could allow an attacker to bypass authentication and gain root-level access to the device.
Attack Parameters
Impact Assessment
CVSS Vector v4.0
Weakness Type (CWE)
Vulnerable Products 11
| Configuration | From (including) | Up to (excluding) |
|---|---|---|
|
Trane Tracer_Sc_Firmware
cpe:2.3:o:trane:tracer_sc_firmware:*:*:*:*:*:*:*:*
|
— |
<= 4.4
|
|
Trane Tracer_Sc_Firmware
cpe:2.3:o:trane:tracer_sc_firmware:4.4:service_pack1:*:*:*:*:*:*
|
— | — |
|
Trane Tracer_Sc_Firmware
cpe:2.3:o:trane:tracer_sc_firmware:4.4:service_pack2:*:*:*:*:*:*
|
— | — |
|
Trane Tracer_Sc_Firmware
cpe:2.3:o:trane:tracer_sc_firmware:4.4:service_pack3:*:*:*:*:*:*
|
— | — |
|
Trane Tracer_Sc_Firmware
cpe:2.3:o:trane:tracer_sc_firmware:4.4:service_pack4:*:*:*:*:*:*
|
— | — |
|
Trane Tracer_Sc_Firmware
cpe:2.3:o:trane:tracer_sc_firmware:4.4:service_pack5:*:*:*:*:*:*
|
— | — |
|
Trane Tracer_Sc_Firmware
cpe:2.3:o:trane:tracer_sc_firmware:4.4:service_pack6:*:*:*:*:*:*
|
— | — |
|
Trane Tracer_Sc
cpe:2.3:h:trane:tracer_sc:*:*:*:*:*:*:*:*
|
— | — |
|
Trane Tracer_Sc\+_Firmware
cpe:2.3:o:trane:tracer_sc\+_firmware:*:*:*:*:*:*:*:*
|
— |
6.3.2310
|
|
Trane Tracer_Sc\+
cpe:2.3:h:trane:tracer_sc\+:*:*:*:*:*:*:*:*
|
— | — |
|
Trane Tracer_Concierge
cpe:2.3:a:trane:tracer_concierge:*:*:*:*:*:*:*:*
|
— |
6.3.2310
|