Fixing and finding
Jump to remediation plan
CVE ID

CVE-2026-3502

Published 2026-03-30
Updated last month
Vendor/s
TrueConf
Product/s
Client
Version/s
* > 8.5.3.884
KEV Status
Active Exploitation
Listed in CISA's Known Exploited Vulnerabilities catalogue. Active exploitation observed in the wild.
CVSS Score (v3.1)
7.8
/ 10
High
Severity Details
Base score
7.8 High
Attack vector
Adjacent_network
Attack complexity
Low
Privileges required
High
User interaction
Required
Scope
Changed
Confidentiality
High
Integrity
High
Availability
Low

Description

CVE-2026-3502 is a high-severity code execution flaw in TrueConf Client. Actively exploited, it allows attackers to substitute tampered update payloads.

CPE

TrueConf logo
TrueConf
Product Version Start Version End (excl.) Status
trueconf * 8.5.3.884 vulnerable

Related weakness (CWE)

CWE-494

Remediation plan

1

Apply official patches

Download and install the latest security updates from TrueConf's official website to ensure the update verification mechanism is active and secure.

2

Update affected systems

Identify all instances of TrueConf Client running versions prior to 8.5.3.884 and force an upgrade to the patched version across all enterprise workstations.

3

Restrict access

Implement network segmentation and use encrypted communication channels to protect the update delivery path from adjacent network interception or Man-in-the-Middle (MITM) attacks.

4

Monitor for exploitation

Audit system logs for suspicious process creation originating from the TrueConf updater and monitor for unexpected network traffic during application update cycles.

Detection Guidance

Detecting exploitation of CVE-2026-3502 requires monitoring for unusual process behavior. Look for the TrueConf updater spawning shell processes like cmd.exe or PowerShell. Network administrators should inspect for ARP spoofing or unauthorized DNS redirects on local segments that could indicate a Man-in-the-Middle attack. Additionally, review endpoint logs for unsigned or improperly signed binaries being executed from temporary directories used by the TrueConf update service.

References

Sources

NIST National Vulnerability Database (NVD)
CISA Known Exploited Vulnerabilities (KEV)

Experience superior visibility and a simpler approach to cyber risk management