Skip to main content
Press slash or control plus K to focus the search. Use the arrow keys to navigate results and press enter to open a threat.
Reconnecting to live updates…

CVE-2026-3796: Improper Access Controls in Qi-ANXIN QAX Virus Removal

0
Medium
VulnerabilityCVE-2026-3796cvecve-2026-3796
Published: Mon Mar 09 2026 (03/09/2026, 02:32:08 UTC)
Source: CVE Database V5
Vendor/Project: Qi-ANXIN
Product: QAX Virus Removal

Description

A weakness has been identified in Qi-ANXIN QAX Virus Removal up to 2025-10-22. The affected element is the function ZwTerminateProcess in the library QKSecureIO_Imp.sys of the component Mini Filter Driver. Executing a manipulation can lead to improper access controls. The attack is restricted to local execution. The exploit has been made available to the public and could be used for attacks. The vendor was contacted early about this disclosure but did not respond in any way.

AI-Powered Analysis

Machine-generated threat intelligence

AILast updated: 03/16/2026, 09:27:28 UTC

Technical Analysis

CVE-2026-3796 identifies an improper access control vulnerability in Qi-ANXIN's QAX Virus Removal software, specifically within the ZwTerminateProcess function of the QKSecureIO_Imp.sys Mini Filter Driver component. This function is responsible for terminating processes at the kernel level. The vulnerability arises because the access control mechanisms governing this function are insufficient, allowing a local attacker with limited privileges (PR:L) to manipulate process termination operations improperly. The attack vector is local, meaning the attacker must have access to the system, but no user interaction is required to exploit the flaw. The vulnerability impacts confidentiality, integrity, and availability to a limited extent by enabling unauthorized termination of processes, potentially leading to privilege escalation or denial of service. The CVSS 4.0 base score is 4.8 (medium), reflecting the limited attack scope but notable impact. The vendor was contacted early but has not issued a patch or response, and a public exploit is available, increasing the risk of exploitation. No known exploits in the wild have been reported yet, but the public availability of exploit code raises the likelihood of future attacks. The vulnerability affects versions of QAX Virus Removal up to 2025-10-22. The lack of vendor response and patch availability means organizations must rely on compensating controls until an official fix is released.

Potential Impact

The vulnerability allows a local attacker with limited privileges to improperly terminate processes, which can lead to unauthorized disruption of system operations, potential privilege escalation, or denial of service. This could compromise system stability and security, especially if critical security or system processes are terminated. Although remote exploitation is not possible, insider threats or malware with local access could leverage this flaw to escalate privileges or evade detection by terminating security tools. The availability of a public exploit increases the risk of exploitation, potentially leading to increased incidents of unauthorized access or system compromise. Organizations relying on Qi-ANXIN QAX Virus Removal for endpoint protection may experience reduced effectiveness of their security posture if this vulnerability is exploited. The lack of vendor remediation further exacerbates the risk, as no official patch is currently available to address the issue.

Mitigation Recommendations

1. Restrict local user privileges to the minimum necessary to reduce the risk of exploitation by low-privileged users. 2. Implement strict access control policies and monitor for unusual process termination activities, especially those involving security or system processes. 3. Employ host-based intrusion detection systems (HIDS) or endpoint detection and response (EDR) solutions to detect and alert on suspicious use of ZwTerminateProcess or related kernel-level operations. 4. Isolate critical systems and limit local access to trusted personnel only. 5. Regularly audit and review system logs for signs of exploitation attempts. 6. Engage with Qi-ANXIN for updates and monitor for any forthcoming patches or advisories. 7. Consider temporary alternative security solutions if the risk is deemed unacceptable and no patch is forthcoming. 8. Educate internal teams about the vulnerability and the importance of minimizing local access and privilege escalation risks.

Pro Console: star threats, build custom feeds, automate alerts via Slack, email & webhooks.Upgrade to Pro

Technical Details

Data Version
5.2
Assigner Short Name
VulDB
Date Reserved
2026-03-08T08:41:59.080Z
Cvss Version
4.0
State
PUBLISHED

Threat ID: 69ae3d052904315ca386c494

Added to database: 3/9/2026, 3:22:45 AM

Last enriched: 3/16/2026, 9:27:28 AM

Last updated: 4/28/2026, 9:23:44 AM

Views: 70

Community Reviews

0 reviews

Crowdsource mitigation strategies, share intel context, and vote on the most helpful responses. Sign in to add your voice and help keep defenders ahead.

Sort by
Loading community insights…

Want to contribute mitigation steps or threat intel context? Sign in or create an account to join the community discussion.

Actions

PRO

Updates to AI analysis require Pro Console access. Upgrade inside Console → Billing.

Please log in to the Console to use AI analysis features.

Need more coverage?

Upgrade to Pro Console for AI refresh and higher limits.

For incident response and remediation, OffSeq services can help resolve threats faster.

Latest Threats

Breach by OffSeqOFFSEQFRIENDS — 25% OFF

Check if your credentials are on the dark web

Instant breach scanning across billions of leaked records. Free tier available.

Scan now
OffSeq TrainingCredly Certified

Lead Pen Test Professional

Technical5-day eLearningPECB Accredited
View courses