TROYANOSYVIRUS
Back to CVEs

CVE-2026-3502

HIGHCISA KEV
7.8

Description

TrueConf Client downloads application update code and applies it without performing verification. An attacker who is able to influence the update delivery path can substitute a tampered update payload. If the payload is executed or installed by the updater, this may result in arbitrary code execution in the context of the updating process or user.

CVE Details

CVSS v3.1 Score7.8
SeverityHIGH
CVSS VectorCVSS:3.1/AV:A/AC:L/PR:H/UI:R/S:C/C:H/I:H/A:L
Attack VectorADJACENT_NETWORK
ComplexityLOW
Privileges RequiredHIGH
User InteractionREQUIRED
Published3/30/2026
Last Modified4/3/2026
Sourcenvd
Honeypot Sightings0

CISA KEV

VendorTrueConf
ProductClient
Vulnerability NameTrueConf Client Download of Code Without Integrity Check Vulnerability
KEV Date Added2026-04-02
Remediation Due Date2026-04-16
Ransomware UseUnknown

Affected Products

trueconf:trueconf

Weaknesses (CWE)

CWE-494

IOC Correlations

No correlations recorded

This product uses data from the NVD API but is not endorsed or certified by the NVD.