Full-text search. Typo-tolerant.

CVE-2026-3502 - [KEV] - CVSS 7.8

CVE-2026-3502 - [KEV] - CVSS 7.8

Overview

CVE-2026-3502 is a download of code without integrity check vulnerability (CWE-494) affecting the TrueConf Client. The application's update mechanism fails to validate the authenticity or integrity of update payloads before execution. An attacker positioned to influence the update delivery path—through network interception, DNS manipulation, compromise of update infrastructure, or related path-substitution techniques—can deliver a tampered payload that the updater will execute, resulting in arbitrary code execution in the context of the updater process or the current user.

The vulnerability carries a CVSS score of 7.8 and an EPSS of 0.015. Despite the relatively low EPSS, CISA added CVE-2026-3502 to the Known Exploited Vulnerabilities (KEV) catalog on 2026-04-02, confirming active in-the-wild exploitation.

Affected Products

Organizations should consult the vendor advisory for the exact version range affected and the fixed release.

Exploitation Evidence

ATT&CK Mapping

No formal ATT&CK mappings are present in the database. Based on the vulnerability class, the following techniques are plausible during an exploitation chain:

Threat Actor Context

No public threat actor attribution is currently available in the database for CVE-2026-3502. KEV listing implies confirmed exploitation by at least one threat actor, but specific group attribution has not been disclosed. Update-channel substitution attacks are historically associated with both nation-state operators (for targeted implants) and opportunistic AitM operators on hostile networks.

Recommended Actions