CVE-2026-3796
Received Received - Intake
Improper Access Control in Qi-ANXIN Mini Filter Driver

Publication date: 2026-03-09

Last updated on: 2026-04-29

Assigner: VulDB

Description
A weakness has been identified in Qi-ANXIN QAX Virus Removal up to 2025-10-22. The affected element is the function ZwTerminateProcess in the library QKSecureIO_Imp.sys of the component Mini Filter Driver. Executing a manipulation can lead to improper access controls. The attack is restricted to local execution. The exploit has been made available to the public and could be used for attacks. The vendor was contacted early about this disclosure but did not respond in any way.
CVSS Scores
EPSS Scores
Probability:
Percentile:
Meta Information
Published
2026-03-09
Last Modified
2026-04-29
Generated
2026-05-07
AI Q&A
2026-03-09
EPSS Evaluated
2026-05-05
NVD
EUVD
Affected Vendors & Products
Showing 1 associated CPE
Vendor Product Version / Range
qianxin qax_internet_control_gateway to 2025-10-22 (inc)
Helpful Resources
Exploitability
CWE
CWE Icon
KEV
KEV Icon
CWE ID Description
CWE-266 A product incorrectly assigns a privilege to a particular actor, creating an unintended sphere of control for that actor.
CWE-284 The product does not restrict or incorrectly restricts access to a resource from an unauthorized actor.
Attack-Flow Graph
AI Powered Q&A
Can you explain this vulnerability to me?

[{'type': 'paragraph', 'content': "CVE-2026-3796 is a vulnerability in the Qi-ANXIN QAX Virus Removal software, specifically in the mini filter driver component QKSecureIO_Imp.sys. The flaw exists in the ZwTerminateProcess function, which is used to terminate processes. The driver relies on the caller process's image to authorize communication, but this check is insufficient and can be bypassed by attackers using techniques like DLL sideloading or process injection to impersonate legitimate processes."}, {'type': 'paragraph', 'content': 'By exploiting this weakness, an attacker with local access can send specially crafted messages to the mini filter driver to arbitrarily terminate processes, including protected ones, without proper authorization. This improper access control can compromise system stability and security.'}] [1, 3, 4]


How can this vulnerability impact me? :

This vulnerability allows a local attacker to terminate arbitrary processes on the affected system, including protected or critical processes. This can lead to denial of service by stopping essential services or applications, potentially causing system instability or crashes.

Because the attacker can bypass normal access controls, the confidentiality, integrity, and availability of the system can be compromised. The exploit is publicly available and considered easy to use, increasing the risk of exploitation.


How does this vulnerability affect compliance with common standards and regulations (like GDPR, HIPAA)?:

I don't know


How can this vulnerability be detected on my network or system? Can you suggest some commands?

This vulnerability affects the QKSecureIO_Imp.sys driver used by Qi-ANXIN QAX Virus Removal versions up to 2025-10-22. Detection involves identifying the presence of this vulnerable driver and monitoring for suspicious local process termination attempts that exploit the ZwTerminateProcess function.

Since the attack requires local execution and involves process spoofing techniques such as DLL sideloading or process injection, detection can include checking for the presence of the vulnerable driver file located at C:\Windows\system32\drivers\QKSecureIO_Imp.sys.

Suggested commands to detect the vulnerable driver on a Windows system include:

  • Using PowerShell to check for the driver file: Get-Item -Path C:\Windows\system32\drivers\QKSecureIO_Imp.sys
  • Listing loaded drivers to see if QKSecureIO_Imp.sys is active: driverquery | findstr QKSecureIO_Imp.sys
  • Monitoring process termination events in the Event Viewer under Windows Logs > Security for suspicious activity involving ZwTerminateProcess.

Note that no specific detection commands or signatures are provided in the available resources, so detection relies on identifying the vulnerable driver and monitoring for abnormal process termination behavior.


What immediate steps should I take to mitigate this vulnerability?

There are no known vendor-provided patches or countermeasures for this vulnerability as the vendor did not respond to the disclosure.

Immediate mitigation steps include:

  • Avoid using the Qi-ANXIN QAX Virus Removal software versions up to 2025-10-22 that contain the vulnerable QKSecureIO_Imp.sys driver.
  • Consider replacing the affected product with alternative security solutions that do not contain this vulnerability.
  • Restrict local user privileges to prevent unauthorized local execution of exploits.
  • Monitor systems for suspicious process termination activities and unauthorized process injections.

Since the exploit is publicly available and easy to execute locally, minimizing local access and privilege escalation opportunities is critical.


Ask Our AI Assistant
Need more information? Ask your question to get an AI reply (Powered by our expertise)
0/70
EPSS Chart