CVE-2026-3796
Improper Access Control in Qi-ANXIN Mini Filter Driver
Publication date: 2026-03-09
Last updated on: 2026-04-29
Assigner: VulDB
Description
Description
CVSS Scores
EPSS Scores
| Probability: | |
| Percentile: |
Meta Information
Affected Vendors & Products
| Vendor | Product | Version / Range |
|---|---|---|
| qianxin | qax_internet_control_gateway | to 2025-10-22 (inc) |
Helpful Resources
Exploitability
| CWE ID | Description |
|---|---|
| CWE-266 | A product incorrectly assigns a privilege to a particular actor, creating an unintended sphere of control for that actor. |
| CWE-284 | The product does not restrict or incorrectly restricts access to a resource from an unauthorized actor. |
Attack-Flow Graph
AI Powered Q&A
Can you explain this vulnerability to me?
[{'type': 'paragraph', 'content': "CVE-2026-3796 is a vulnerability in the Qi-ANXIN QAX Virus Removal software, specifically in the mini filter driver component QKSecureIO_Imp.sys. The flaw exists in the ZwTerminateProcess function, which is used to terminate processes. The driver relies on the caller process's image to authorize communication, but this check is insufficient and can be bypassed by attackers using techniques like DLL sideloading or process injection to impersonate legitimate processes."}, {'type': 'paragraph', 'content': 'By exploiting this weakness, an attacker with local access can send specially crafted messages to the mini filter driver to arbitrarily terminate processes, including protected ones, without proper authorization. This improper access control can compromise system stability and security.'}] [1, 3, 4]
How can this vulnerability impact me? :
This vulnerability allows a local attacker to terminate arbitrary processes on the affected system, including protected or critical processes. This can lead to denial of service by stopping essential services or applications, potentially causing system instability or crashes.
Because the attacker can bypass normal access controls, the confidentiality, integrity, and availability of the system can be compromised. The exploit is publicly available and considered easy to use, increasing the risk of exploitation.
How does this vulnerability affect compliance with common standards and regulations (like GDPR, HIPAA)?:
I don't know
How can this vulnerability be detected on my network or system? Can you suggest some commands?
This vulnerability affects the QKSecureIO_Imp.sys driver used by Qi-ANXIN QAX Virus Removal versions up to 2025-10-22. Detection involves identifying the presence of this vulnerable driver and monitoring for suspicious local process termination attempts that exploit the ZwTerminateProcess function.
Since the attack requires local execution and involves process spoofing techniques such as DLL sideloading or process injection, detection can include checking for the presence of the vulnerable driver file located at C:\Windows\system32\drivers\QKSecureIO_Imp.sys.
Suggested commands to detect the vulnerable driver on a Windows system include:
- Using PowerShell to check for the driver file: Get-Item -Path C:\Windows\system32\drivers\QKSecureIO_Imp.sys
- Listing loaded drivers to see if QKSecureIO_Imp.sys is active: driverquery | findstr QKSecureIO_Imp.sys
- Monitoring process termination events in the Event Viewer under Windows Logs > Security for suspicious activity involving ZwTerminateProcess.
Note that no specific detection commands or signatures are provided in the available resources, so detection relies on identifying the vulnerable driver and monitoring for abnormal process termination behavior.
What immediate steps should I take to mitigate this vulnerability?
There are no known vendor-provided patches or countermeasures for this vulnerability as the vendor did not respond to the disclosure.
Immediate mitigation steps include:
- Avoid using the Qi-ANXIN QAX Virus Removal software versions up to 2025-10-22 that contain the vulnerable QKSecureIO_Imp.sys driver.
- Consider replacing the affected product with alternative security solutions that do not contain this vulnerability.
- Restrict local user privileges to prevent unauthorized local execution of exploits.
- Monitor systems for suspicious process termination activities and unauthorized process injections.
Since the exploit is publicly available and easy to execute locally, minimizing local access and privilege escalation opportunities is critical.