A weakness has been identified in Qi-ANXIN QAX Virus Removal up to 2025-10-22. The affected element is the function ZwTerminateProcess in the library QKSecureIO_Imp.sys of the component Mini Filter Driver. Executing a manipulation can lead to improper access controls. The attack is restricted to local execution. The exploit has been made available to the public and could be used for attacks. The vendor was contacted early about this disclosure but did not respond in any way.
History

Tue, 10 Mar 2026 21:15:00 +0000

Type Values Removed Values Added
Metrics ssvc

{'options': {'Automatable': 'no', 'Exploitation': 'poc', 'Technical Impact': 'partial'}, 'version': '2.0.3'}


Tue, 10 Mar 2026 19:00:00 +0000

Type Values Removed Values Added
First Time appeared Qianxin
Qianxin qax Internet Control Gateway
Weaknesses NVD-CWE-Other
CPEs cpe:2.3:a:qianxin:qax_internet_control_gateway:*:*:*:*:*:*:*:*
Vendors & Products Qianxin
Qianxin qax Internet Control Gateway

Mon, 09 Mar 2026 10:15:00 +0000

Type Values Removed Values Added
First Time appeared Qi-anxin
Qi-anxin qax Virus Removal
Vendors & Products Qi-anxin
Qi-anxin qax Virus Removal

Mon, 09 Mar 2026 03:30:00 +0000

Type Values Removed Values Added
Description A weakness has been identified in Qi-ANXIN QAX Virus Removal up to 2025-10-22. The affected element is the function ZwTerminateProcess in the library QKSecureIO_Imp.sys of the component Mini Filter Driver. Executing a manipulation can lead to improper access controls. The attack is restricted to local execution. The exploit has been made available to the public and could be used for attacks. The vendor was contacted early about this disclosure but did not respond in any way.
Title Qi-ANXIN QAX Virus Removal Mini Filter Driver QKSecureIO_Imp.sys ZwTerminateProcess access control
Weaknesses CWE-266
CWE-284
References
Metrics cvssV2_0

{'score': 4.3, 'vector': 'AV:L/AC:L/Au:S/C:P/I:P/A:P/E:POC/RL:ND/RC:UR'}

cvssV3_0

{'score': 5.3, 'vector': 'CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:U/C:L/I:L/A:L/E:P/RL:X/RC:R'}

cvssV3_1

{'score': 5.3, 'vector': 'CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:L/I:L/A:L/E:P/RL:X/RC:R'}

cvssV4_0

{'score': 4.8, 'vector': 'CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:L/VI:L/VA:L/SC:N/SI:N/SA:N/E:P'}


cve-icon MITRE

Status: PUBLISHED

Assigner: VulDB

Published: 2026-03-09T02:32:08.133Z

Updated: 2026-03-10T20:20:47.492Z

Reserved: 2026-03-08T08:41:59.080Z

Link: CVE-2026-3796

cve-icon Vulnrichment

Updated: 2026-03-10T20:20:43.372Z

cve-icon NVD

Status : Analyzed

Published: 2026-03-09T04:15:58.877

Modified: 2026-03-10T18:48:25.113

Link: CVE-2026-3796

cve-icon Redhat

No data.