{
"$type": "site.standard.document",
"bskyPostRef": {
"cid": "bafyreigwp7dqhjcdhj2x7dnzmnjrrozkhszi6z4kvuqhi7elr22ywnbgf4",
"uri": "at://did:plc:6wtxqaikjf62unmnajbfbq5v/app.bsky.feed.post/3miycayselx42"
},
"coverImage": {
"$type": "blob",
"ref": {
"$link": "bafkreie2njt2noctowwseiv25xnepeprsfyskxzm5eb7o7qbe23tso3dki"
},
"mimeType": "image/webp",
"size": 47158
},
"path": "/cisa-adds-actively-exploited-trueconf-flaw-to-kev-and-gives-agencies-until-april-16-to-patch/",
"publishedAt": "2026-04-07T18:16:58.000Z",
"site": "https://vpncentral.com",
"tags": [
"News",
"CISA adds actively exploited TrueConf flaw to KEV and gives agencies until April 16 to patch",
"VPN Central"
],
"textContent": "CISA has added CVE-2026-3502, a TrueConf Client vulnerability, to its Known Exploited Vulnerabilities catalog after confirming active exploitation. The agency says federal civilian agencies must apply mitigations by April 16, 2026, or stop using the product if fixes are unavailable. The flaw affects the TrueConf Client update process. NVD describes it as a download-of-code-without-integrity-check issue, […]\n\nThe post CISA adds actively exploited TrueConf flaw to KEV and gives agencies until April 16 to patch appeared first on VPN Central.",
"title": "CISA adds actively exploited TrueConf flaw to KEV and gives agencies until April 16 to patch"
}