Home / Vulnerabilities / CVE-2026-3502
HIGH SEVERITY
CVE-2026-3502TrueConf · Client

TrueConf Client Download of Code Without Integrity Check Vulnerability

Technical Severity

CVSS v3.1 Metrics

HIGH
7.8 / 10
Minimal Risk Critical
Vector Specification
CVSS:3.1/AV:A/AC:L/PR:H/UI:R/S:C/C:H/I:H/A:L
Exploitation Likelihood

EPSS Prediction

1.48 %
Predictive Probability
Percentile Rank
81.0 th

Documented as more likely to be exploited than 81.0% of known CVEs.

Detection Date

Apr 02, 2026

Remediation Due

Apr 16, 2026

CISA Catalog Active

Threat Analysis

TrueConf Client contains a download of code without integrity check vulnerability. An attacker who is able to influence the update delivery path can substitute a tampered update payload. If the payload is executed or installed by the updater, this may result in arbitrary code execution in the context of the updating process or user.

Remediation Directive

Apply mitigations per vendor instructions, follow applicable BOD 22-01 guidance for cloud services, or discontinue use of the product if mitigations are unavailable.

External Intelligence