Source: Ministry of education information & communication security contingency platform
"" "" ""
| Publication Number | TACERT-ANA-2026041002044343 | Publication Time | 2026/04/10 14:24 |
| Incident Type | ANA-Vulnerability Alert | Discovery Time | 2026/04/10 14:24 |
| Impact Level | Low | ||
| [Subject] 【Vulnerability Alert】 CISA Added 3 Known Exploited Vulnerabilities to the KEV Catalog (2026/03/30–2026/04/05) |
|||
| [Content] Forwarded from TWCERTCC-200-202604-00000005 【CVE-2026-3055】Citrix NetScaler Out-of-Bounds Read Vulnerability (CVSS v3.1: 9.8) 【CVE-2026-5281】Google Dawn Use-After-Free Vulnerability (CVSS v3.1: 8.8) 【CVE-2026-3502】TrueConf Client Download of Code Without Integrity Check Vulnerability (CVSS v3.1: 7.8) (Information Sharing Level: WHITE (Information content can be publicly disclosed) |
|||
| [Affected Platform]
【CVE-2026-3055】Please refer to the affected versions listed on the official website: https://support.citrix.com/support-home/home 【CVE-2026-5281】Please refer to the affected versions listed on the official website: https://chromereleases.googleblog.com/2026/03/stable-channel-update-for-desktop_31.html 【CVE-2026-3502】TrueConf versions 8.1.0 to 8.5.2 (inclusive) |
|||
| [Recommended Actions]
【CVE-2026-3055】A security fix for this vulnerability has been released by the official vendor. Please update to the relevant version. https://support.citrix.com/support-home/home 【CVE-2026-5281】A security fix for this vulnerability has been released by the official vendor. Please update to the relevant version. https://chromereleases.googleblog.com/2026/03/stable-channel-update-for-desktop_31.html 【CVE-2026-3502】Please upgrade the affected product to the following version or later: TrueConf 8.5.3.884 |
|||
| [Reference] | |||