TrueConf Client downloads application update code and applies it without performing verification. An attacker who is able to influence the update delivery path can substitute a tampered update payload. If the payload is executed or installed by the updater, this may result in arbitrary code execution in the context of the updating process or user.
References
| Link | Resource |
|---|---|
| https://trueconf.com/blog/update/trueconf-8-5 |
Configurations
No configuration.
History
30 Mar 2026, 19:16
| Type | Values Removed | Values Added |
|---|---|---|
| New CVE |
Information
Published : 2026-03-30 19:16
Updated : 2026-03-30 19:16
NVD link : CVE-2026-3502
Mitre link : CVE-2026-3502
CVE.ORG link : CVE-2026-3502
JSON object : View
Products Affected
No product.
CWE
CWE-494
Download of Code Without Integrity Check
