CVE-2026-3502
HIGH KEVTrueConf Client Update Integrity Verification Bypass
Title source: cnaDescription
TrueConf Client downloads application update code and applies it without performing verification. An attacker who is able to influence the update delivery path can substitute a tampered update payload. If the payload is executed or installed by the updater, this may result in arbitrary code execution in the context of the updating process or user.
Exploits (2)
nomisec
SCANNER
by fevar54 · poc
https://github.com/fevar54/CVE-2026-3502-Scanner---TrueConf-Vulnerability-Detection-Tool
nomisec
SCANNER
by fevar54 · poc
https://github.com/fevar54/CVE-2026-3502---TrueConf-Client-Update-Hijacking-PoC
References (3)
Scores
CVSS v3
7.8
EPSS
0.0242
EPSS Percentile
85.2%
Attack Vector
ADJACENT_NETWORK
CVSS:3.1/AV:A/AC:L/PR:H/UI:R/S:C/C:H/I:H/A:L
Details
CISA KEV
2026-04-02
VulnCheck KEV
2026-03-31
ENISA EUVD
EUVD-2026-17162
CWE
CWE-494
Status
published
Products (2)
trueconf/trueconf
< 8.5.3.884
TrueConf/TrueConf Client
TrueConf Client versions 8.1.0 through 8.5.2
Published
Mar 30, 2026
KEV Added
Apr 02, 2026
Tracked Since
Mar 31, 2026