Trane Tracer
A code injection vulnerability in Trane Tracer building control systems allows an authenticated user to execute arbitrary code on affected controllers. The vulnerability exists in Tracer Concierge (all versions before 5.5 SP3), Tracer SC (all versions before 4.4 SP7), and Tracer SC+ (all versions before 5.5 SP3). Successful exploitation could give an attacker full control over HVAC and environmental management functions. Trane has released firmware patches for all affected products and recommends isolating controllers from the business network, restricting access, implementing strong authentication, and migrating legacy Tracer SC systems to Tracer SC+.
- Network access to Tracer controller management interface (typically port 80/443)
- Valid user credentials for the Tracer controller
- Controller must be reachable from attacker's network location
Patching may require device reboot — plan for process interruption
/api/v1/advisories/0ebc74a5-e063-4757-a2d0-2d8d216d2899Get OT security insights every Tuesday
Advisory breakdowns, a weekly summary, and incident analyses for the people actually defending OT environments. Free, no account required.