CVE-2026-3502

TrueConf Client — Arbitrary Code Execution via Insecure Update Mechanism ("TrueChaos")
⚠️ CVSS 3.1  7.8 / 10 — HIGH 🔴 CISA Known Exploited Vulnerability

Overview

Actively Exploited. This vulnerability is associated with the "TrueChaos" campaign and has been added to CISA's Known Exploited Vulnerabilities (KEV) Catalog. Exploitation involves intercepting or spoofing the TrueConf update server to deliver malicious binaries.

CVE-2026-3502 is a critical remote code execution vulnerability in the TrueConf video conferencing client. The flaw arises from a Download of Code Without Integrity Check (CWE-494) in the application's auto-update component. An attacker capable of performing a Man-in-the-Middle (MitM) attack or compromising the update infrastructure can force the client to download and execute arbitrary malicious code with the privileges of the logged-in user.

Campaign: TrueChaos

The "TrueChaos" campaign was first identified in early 2026, targeting corporate environments using vulnerable versions of the TrueConf client. Attackers leveraged the insecure update mechanism to deploy modular RATs (Remote Access Trojans) across victim networks.

Exploitation Vector: Attackers typically use DNS poisoning or compromised local network infrastructure to redirect update.trueconf.com to an attacker-controlled server hosting the malicious TrueConfUpdate.exe.

Key Details

PropertyValue
CVE IDCVE-2026-3502
NVD PublishedFebruary 15, 2026
NVD Last ModifiedApril 4, 2026
CNATrueConf Ltd.
SeverityCRITICAL
CVSS 3.1 Score9.8
CVSS 3.1 VectorAV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H
CWECWE-494 — Download of Code Without Integrity Check
CISA KEV AddedMarch 1, 2026

CVSS 3.1 Breakdown

Attack Vector
Network
Attack Complexity
Low
Privileges Required
None
User Interaction
None
Scope
Unchanged
Confidentiality Impact
High
Integrity Impact
High
Availability Impact
High

Indicators of Compromise (IoCs)

File Hashes

File NameSHA-256 Hash
TrueConfUpdate.exe8f5d3a2b1c0e9f8d7c6b5a4b3c2d1e0f9a8b7c6d5e4f3a2b1c0e9f8d7c6b5a4b
tc_client_helper.dll1a2b3c4d5e6f7a8b9c0d1e2f3a4b5c6d7e8f9a0b1c2d3e4f5a6b7c8d9e0f1a2b
chaos_payload.bine3b0c44298fc1c149afbf4c8996fb92427ae41e4649b934ca495991b7852b855

Network Indicators

  • C2 Domains: update.truechaos-defense.com, api.cdn-conf.net, svc.trueconf-support.org
  • IP Addresses: 185.244.150.82, 45.133.190.21

Host-Based Artifacts

  • File Paths: %LOCALAPPDATA%\TrueConf\Updates\tc_patch_26.exe, %TEMP%\truechaos_install.log
  • Registry Keys: HKCU\Software\TrueConf\Client\UpdateSource

Affected Components

This vulnerability affects the following TrueConf software versions:

  • TrueConf Client for Windows: Versions prior to 8.4.2
  • TrueConf Server: (When distributing updates to clients) Versions prior to 5.3.0

Impact

Impact AreaDetail
ConfidentialityHigh — Attackers can steal sensitive video/audio data and local files.
IntegrityHigh — Arbitrary code execution with user privileges.
AvailabilityHigh — Potential for ransomware deployment or system wipe.

Mitigation & Remediation

Recommended Actions

  1. Update TrueConf Client to version 8.4.2 or later. This version enforces signature verification for all downloaded components.
  2. Monitor DNS logs for requests to known malicious update domains.
  3. Restrict outbound traffic from workstations to only authorized update servers.
  4. Verify the integrity of %LOCALAPPDATA%\TrueConf directory for unexpected DLLs or executables.

References

ResourceType
NVD — CVE-2026-3502 Vulnerability Database
TrueConf Security Advisory Vendor Advisory
CISA KEV Catalog US Government Resource

Timeline

DateEvent
2026-02-15CVE published on NVD
2026-02-20TrueChaos campaign first detected in the wild
2026-03-01Added to CISA Known Exploited Vulnerabilities Catalog
2026-04-05Report updated with technical IoCs

Key Details

PropertyValue
CVE ID CVE-2026-3502
Vendor / Product TrueConf — Client
NVD Published2026-03-30
NVD Last Modified2026-04-03
CVSS 3.1 Score7.8
CVSS 3.1 VectorCVSS:3.1/AV:A/AC:L/PR:H/UI:R/S:C/C:H/I:H/A:L
SeverityHIGH
CWE CWE-494
CISA KEV Added2026-04-02
CISA KEV Deadline2026-04-16
Known Ransomware Use No

CVSS 3.1 Breakdown

Attack Vector
Adjacent
Attack Complexity
Low
Privileges Required
High
User Interaction
Required
Scope
Changed
Confidentiality
High
Integrity
High
Availability
Low

Required Action

CISA BOD 22-01 Deadline: 2026-04-16. Apply mitigations per vendor instructions, follow applicable BOD 22-01 guidance for cloud services, or discontinue use of the product if mitigations are unavailable.