{"dataType":"CVE_RECORD","dataVersion":"5.2","cveMetadata":{"cveId":"CVE-2026-3502","assignerOrgId":"897c38be-0345-43cd-b6cf-fe179e0c4f45","state":"PUBLISHED","assignerShortName":"checkpoint","dateReserved":"2026-03-03T21:18:35.221Z","datePublished":"2026-03-30T18:05:42.806Z","dateUpdated":"2026-04-03T03:55:23.638Z"},"containers":{"cna":{"affected":[{"product":"TrueConf Client","vendor":"TrueConf","versions":[{"status":"affected","version":"TrueConf Client versions 8.1.0 through 8.5.2"}]}],"title":"TrueConf Client Update Integrity Verification Bypass","descriptions":[{"lang":"en","value":"TrueConf Client downloads application update code and applies it without performing verification. An attacker who is able to influence the update delivery path can substitute a tampered update payload. If the payload is executed or installed by the updater, this may result in arbitrary code execution in the context of the updating process or user."}],"problemTypes":[{"descriptions":[{"cweId":"CWE-494","description":"CWE-494: Download of Code Without Integrity Check.","lang":"en","type":"CWE"}]}],"providerMetadata":{"orgId":"897c38be-0345-43cd-b6cf-fe179e0c4f45","shortName":"checkpoint","dateUpdated":"2026-03-30T18:05:42.806Z"},"references":[{"url":"https://trueconf.com/blog/update/trueconf-8-5"}],"metrics":[{"format":"CVSS","scenarios":[{"lang":"en","value":"GENERAL"}],"cvssV3_1":{"version":"3.1","attackVector":"ADJACENT_NETWORK","attackComplexity":"LOW","privilegesRequired":"HIGH","userInteraction":"REQUIRED","scope":"CHANGED","confidentialityImpact":"HIGH","integrityImpact":"HIGH","availabilityImpact":"LOW","baseScore":7.8,"baseSeverity":"HIGH","vectorString":"CVSS:3.1/AV:A/AC:L/PR:H/UI:R/S:C/C:H/I:H/A:L"}}]},"adp":[{"references":[{"url":"https://research.checkpoint.com/2026/operation-truechaos-0-day-exploitation-against-southeast-asian-government-targets/","tags":["third-party-advisory"]},{"url":"https://www.cisa.gov/known-exploited-vulnerabilities-catalog?field_cve=CVE-2026-3502","tags":["government-resource"]}],"metrics":[{"other":{"type":"ssvc","content":{"timestamp":"2026-03-31T00:00:00+00:00","options":[{"Exploitation":"active"},{"Automatable":"no"},{"Technical Impact":"total"}],"role":"CISA Coordinator","version":"2.0.3","id":"CVE-2026-3502"}}},{"other":{"type":"kev","content":{"dateAdded":"2026-04-02","reference":"https://www.cisa.gov/known-exploited-vulnerabilities-catalog?field_cve=CVE-2026-3502"}}}],"title":"CISA ADP Vulnrichment","providerMetadata":{"orgId":"134c704f-9b21-4f2e-91b3-4a467353bcc0","shortName":"CISA-ADP","dateUpdated":"2026-04-03T03:55:23.638Z"},"timeline":[{"time":"2026-04-02T00:00:00.000Z","lang":"en","value":"CVE-2026-3502 added to CISA KEV"}]}]}}