7.8

CVE-2026-3502

Warnung
Medienbericht
TrueConf Client downloads application update code and applies it without performing verification. An attacker who is able to influence the update delivery path can substitute a tampered update payload. If the payload is executed or installed by the updater, this may result in arbitrary code execution in the context of the updating process or user.
Daten sind bereitgestellt durch National Vulnerability Database (NVD)
TrueconfTrueconf SwPlatformwindows Version < 8.5.3.884

02.04.2026: CISA Known Exploited Vulnerabilities (KEV) Catalog

TrueConf Client Download of Code Without Integrity Check Vulnerability

Schwachstelle

TrueConf Client contains a download of code without integrity check vulnerability. An attacker who is able to influence the update delivery path can substitute a tampered update payload. If the payload is executed or installed by the updater, this may result in arbitrary code execution in the context of the updating process or user.

Beschreibung

Apply mitigations per vendor instructions, follow applicable BOD 22-01 guidance for cloud services, or discontinue use of the product if mitigations are unavailable.

Erforderliche Maßnahmen
EPSS Metriken
Typ Quelle Score Percentile
EPSS FIRST.org 1.48% 0.81
CVSS Metriken
Quelle Base Score Exploit Score Impact Score Vector String
cve@checkpoint.com 7.8 1.2 6
CVSS:3.1/AV:A/AC:L/PR:H/UI:R/S:C/C:H/I:H/A:L
CWE-494 Download of Code Without Integrity Check

The product downloads source code or an executable from a remote location and executes the code without sufficiently verifying the origin and integrity of the code.