Loading
TrueConf Client downloads application update code and applies it without performing verification. An attacker who is able to influence the update delivery path can substitute a tampered update payload. If the payload is executed or installed by the updater, this may result in arbitrary code execution in the context of the updating process or user.
Use CWE-494, Trueconf vendor hub and Trueconf product page to widen CVE-2026-3502 into its surrounding weakness, vendor, and product context.
Compare it with CVE-2025-66835 for nearby disclosures in the same product family.