Description
TrueConf Client downloads application update code and applies it without performing verification. An attacker who is able to influence the update delivery path can substitute a tampered update payload. If the payload is executed or installed by the updater, this may result in arbitrary code execution in the context of the updating process or user.
INFO
Published Date :
2026-03-30T18:05:42.806Z
Last Modified :
2026-03-30T18:05:42.806Z
Source :
checkpoint
AFFECTED PRODUCTS
The following products are affected by CVE-2026-3502 vulnerability.
No data.
REFERENCES
Here, you will find a curated list of external links that provide in-depth information to CVE-2026-3502.
| URL | Resource |
|---|---|
| https://trueconf.com/blog/update/trueconf-8-5 |
|
CVSS Vulnerability Scoring System
Detailed values of each vector for above chart.
Attack Vector
Attack Complexity
Privileges Required
User Interaction
Scope
Confidentiality Impact
Integrity Impact
Availability Impact