TrueConf Client Download of Code Without Integrity Check Vulnerability

Release Date: 02nd April 2026

Impact : HIGH / CRITICAL

TLP Rating: Clear

Communication and Digital Transformation (DCDT through CERT Vanuatu (CERTVU), provides the following advisory

This alert is relevant to Organizations and System/Network administrators that utilize the above products. This alert is intended to be understood by technical users and systems administrators.

What is it?

CVE-2026-3502 is a high-severity vulnerability (CVSS ~8.1) affecting Atlassian Confluence deployments. The issue stems from improper input validation.

TrueConf Client contains a download of code without integrity check vulnerability. An attacker who is able to influence the update delivery path can substitute a tampered update payload. If the payload is executed or installed by the updater, this may result in arbitrary code execution in the context of the updating process or user.

 

References

  1. https://www.cisa.gov/known-exploited-vulnerabilities-catalog
  2. https://www.cve.org/CVERecord?id=CVE-2026-3502