CISA KEV 정보
| 취약점명 | TrueConf Client Download of Code Without Integrity Check Vulnerability |
|---|---|
| 설명 | TrueConf Client contains a download of code without integrity check vulnerability. An attacker who is able to influence the update delivery path can substitute a tampered update payload. If the payload is executed or installed by the updater, this may result in arbitrary code execution in the context of the updating process or user. |
| 조치사항 | Apply mitigations per vendor instructions, follow applicable BOD 22-01 guidance for cloud services, or discontinue use of the product if mitigations are unavailable. |
| 랜섬웨어 캠페인 악용 | Unknown |
| CWE | CWE-494 |
| 등록일 (KEV) | 2026-04-02 |
| 조치 기한 | 2026-04-16 |
| 추가 참고 | https://trueconf.com/blog/update/trueconf-8-5 ; https://trueconf.com/downloads/windows.html ; https://nvd.nist.gov/vuln/detail/CVE-2026-3502 |
NVD 상세 정보
CVSS v3.1: 7.8 HIGH
CVSS:3.1/AV:A/AC:L/PR:H/UI:R/S:C/C:H/I:H/A:L설명: TrueConf Client downloads application update code and applies it without performing verification. An attacker who is able to influence the update delivery path can substitute a tampered update payload. If the payload is executed or installed by the updater, this may result in arbitrary code execution in the context of the updating process or user.
CWE: CWE-494
참조
- https://trueconf.com/blog/update/trueconf-8-5 [Product, Release Notes]
- https://research.checkpoint.com/2026/operation-truechaos-0-day-exploitation-against-southeast-asian-government-targets/ [Third Party Advisory]
- https://www.cisa.gov/known-exploited-vulnerabilities-catalog?field_cve=CVE-2026-3502 [US Government Resource]
This product uses the NVD API but is not endorsed or certified by the NVD.