VYPR
High severity7.8CISA KEVNVD Advisory· Published Mar 30, 2026· Updated Apr 3, 2026

CVE-2026-3502

CVE-2026-3502

Description

TrueConf Client downloads application update code and applies it without performing verification. An attacker who is able to influence the update delivery path can substitute a tampered update payload. If the payload is executed or installed by the updater, this may result in arbitrary code execution in the context of the updating process or user.

Affected products

1
  • cpe:2.3:a:trueconf:trueconf:*:*:*:*:*:windows:*:*
    Range: <8.5.3.884

Patches

0

No patches discovered yet.

Vulnerability mechanics

AI mechanics synthesis has not run for this CVE yet.

References

3

News mentions

4