CVE-2026-3502Friday, April 3, 2026

TrueConf Client Update Integrity Bypass — Remote Code Execution via Tampered Updates

TrueConf Client downloads application updates without verifying their integrity or authenticity. An attacker who can intercept or influence the update mechanism can deliver a tampered update package, resulting in arbitrary code execution.

Known Exploited(Apr 2, 2026)✓ Fix Available
💡

This section explains the vulnerability in everyday language, so anyone can understand the risk and impact.

Imagine you get a software update notification from your video conferencing app, TrueConf. You click 'update' thinking it's legit — but the app never actually checks if the update is real or fake. An attacker sitting on your network (or who compromised the update server) can slip in malicious code disguised as an update. Your computer installs it without question. This was used as a zero-day in real attacks against Southeast Asian government networks in an operation called 'TrueChaos.' CISA added it to their must-patch list.

Affected Products

No affected products listed
🔧

Remediation

Fix Available

Update to TrueConf Client version 8.5 or later, which adds update integrity verification. If immediate patching is not possible, block or monitor TrueConf update traffic at the network perimeter.

✓ Apply vendor patches as available
CVSS Score
7.8
HighCVSS:3.1/AV:A/AC:L/PR:H/UI:R/S:C/C:H/I:H/A:L
CVSS Vector (v3.1)
Attack VectorAdjacent
Attack ComplexityLow
Privileges RequiredHigh
User InteractionRequired
ScopeChanged
ConfidentialityHigh
IntegrityHigh
AvailabilityLow
Quick Info
CVE IDCVE-2026-3502
Severityhigh
FixAvailable
KEVListed
PublishedApr 3, 2026