U.S. CISA adds a flaw in TrueConf Client to its Known Exploited Vulnerabilities catalog
嗯,用户让我用中文总结一篇文章,控制在100字以内,而且不需要特定的开头。首先,我需要仔细阅读这篇文章,理解主要内容。 文章讲的是美国CISA将TrueConf Client的一个漏洞加入到已知被利用的漏洞目录中。这个漏洞是CVE-2026-3502,CVSS评分7.8。TrueConf是一个视频会议平台,常用于政府和关键部门的内部网络,所以这个漏洞很有价值。 漏洞允许客户端下载和安装未经验证的更新,攻击者可以篡改更新源,植入恶意文件,从而在系统上执行任意代码。研究人员提到攻击者已经入侵了政府环境中的TrueConf服务器,利用这个漏洞分发恶意更新。 Check Point追踪了这些攻击,并将其命名为Operation TrueChaos,怀疑是与中国相关的威胁行为者所为。CISA要求联邦机构在2026年4月16日前修复这个漏洞。 接下来,我需要将这些信息浓缩到100字以内。要抓住关键点:CISA加入漏洞、TrueConf平台、攻击者利用更新机制植入恶意软件、影响政府机构、修复截止日期。 确保语言简洁明了,避免使用复杂的术语。可能需要调整句子结构以节省字数。 最后检查一下是否符合用户的要求:中文总结、100字以内、直接描述内容。 </think> 美国网络安全与基础设施安全局(CISA)将视频会议软件TrueConf Client的一个高危漏洞(CVE-2026-3502)加入已知被利用漏洞目录。该漏洞允许攻击者通过篡改更新机制植入恶意软件,已影响政府机构。CISA要求联邦机构于2026年4月16日前修复此漏洞。 2026-4-4 16:42:38 Author: securityaffairs.com(查看原文) 阅读量:10 收藏

U.S. CISA adds a flaw in TrueConf Client to its Known Exploited Vulnerabilities catalog

The U.S. Cybersecurity and Infrastructure Security Agency (CISA) adds a flaw in TrueConf Client to its Known Exploited Vulnerabilities catalog

The U.S. Cybersecurity and Infrastructure Security Agency (CISA) added a flaw in TrueConf Client, tracked as CVE-2026-3502 (CVSS score of 7.8), to its Known Exploited Vulnerabilities (KEV) catalog.

TrueConf is a videoconferencing platform often used in secure, offline networks by governments and critical sectors, making it a valuable target.

CVE-2026-3502 is a flaw in TrueConf Client that allows it to download and install updates without verifying them. Attackers who can tamper with the update source can deliver malicious files, leading to arbitrary code execution on the system.

Researchers warn that threat actors are compromising TrueConf servers in government environments, exploiting the CVE-2026-3502 flaw to malicious updates.

Attackers replaced update files with malicious ones, tricking users into installing them. This delivered the Havoc framework, enabling control, surveillance, and persistence.

“The infections began when TrueConf client application launched, probably by a link sent to the target from the attacker. This link launched the already installed TrueConf client and presented an update prompt claiming that a newer version was available. Prior to the victim’s interaction, the attacker had already replaced the update package on the TrueConf on-premises server with a weaponize\d version, ensuring that the client retrieved a malicious file through the normal update process.” reported Check Point. “The compromised TrueConf on-premises server was operated by the governmental IT department and served as a video conferencing platform for dozens of government entities across the country, which were all supplied with the same malicious update.”

Checkpoint researchers tracked this wave of attacks as Operation TrueChaos and link it to a China-aligned threat actor with moderate confidence, citing tactics like DLL sideloading, use of Alibaba and Tencent infrastructure, and targeted victims. The same victim was also hit by ShadowPad, suggesting shared tools, access, or multiple Chinese-linked actors targeting it simultaneously.

According to Binding Operational Directive (BOD) 22-01: Reducing the Significant Risk of Known Exploited Vulnerabilities, FCEB agencies have to address the identified vulnerabilities by the due date to protect their networks against attacks exploiting the flaws in the catalog.

Experts also recommend that private organizations review the Catalog and address the vulnerabilities in their infrastructure.

CISA orders federal agencies to fix the vulnerability by April 16, 2026.

Pierluigi Paganini

Follow me on Twitter: @securityaffairs and Facebook and Mastodon

(SecurityAffairs – hacking, US CISA Known Exploited Vulnerabilities catalog)




文章来源: https://securityaffairs.com/190341/security/u-s-cisa-adds-a-flaw-in-trueconf-client-to-its-known-exploited-vulnerabilities-catalog.html
如有侵权请联系:admin#unsafe.sh