CVE-2026-3502
Published Mar 30, 2026
Last updated 16 days ago
- Description
- TrueConf Client downloads application update code and applies it without performing verification. An attacker who is able to influence the update delivery path can substitute a tampered update payload. If the payload is executed or installed by the updater, this may result in arbitrary code execution in the context of the updating process or user.
- Source
- cve@checkpoint.com
- NVD status
- Analyzed
- Products
- trueconf
CVSS 3.1
- Type
- Secondary
- Base score
- 7.8
- Impact score
- 6
- Exploitability score
- 1.2
- Vector string
- CVSS:3.1/AV:A/AC:L/PR:H/UI:R/S:C/C:H/I:H/A:L
- Severity
- HIGH
Data from CISA
- Vulnerability name
- TrueConf Client Download of Code Without Integrity Check Vulnerability
- Exploit added on
- Apr 2, 2026
- Exploit action due
- Apr 16, 2026
- Required action
- Apply mitigations per vendor instructions, follow applicable BOD 22-01 guidance for cloud services, or discontinue use of the product if mitigations are unavailable.
- cve@checkpoint.com
- CWE-494
- Hype score
- Not currently trending
[
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:a:trueconf:trueconf:*:*:*:*:*:windows:*:*",
"matchCriteriaId": "C61E9BE0-CED2-4518-933B-7538A4E8F890",
"versionEndExcluding": "8.5.3.884",
"vulnerable": true
}
],
"negate": false,
"operator": "OR"
}
]
}
]