Cyber Posture

CVE-2026-3796

MediumLPE

Published: 09 March 2026

Published
09 March 2026
Modified
10 March 2026
KEV Added
Patch
CVSS Score 5.3 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:L/I:L/A:L
EPSS Score 0.0001 0.3th percentile
Risk Priority 11 60% EPSS · 20% KEV · 20% CVSS

Summary

CVE-2026-3796 is a medium-severity Incorrect Privilege Assignment (CWE-266) vulnerability in Qianxin Qax Internet Control Gateway. Its CVSS base score is 5.3 (Medium).

Operationally, exploitation aligns with the MITRE ATT&CK technique Exploitation for Privilege Escalation (T1068); ranked at the 0.3th percentile by exploit likelihood (below the median); it is not currently listed in the CISA KEV catalog.

Threat & Defense at a Glance

What attackers do: exploitation maps to Exploitation for Privilege Escalation (T1068) and 1 other technique.
Threat & Defense Details

Likely Mitigating ControlsAI

Per-CVE control mapping for this CVE has not run yet; the list below is derived from the weakness types (CWEs) cited in the NVD entry.

addresses: CWE-284 CWE-266

The access control policy and procedures directly mandate and enforce proper access control mechanisms across the organization.

addresses: CWE-284 CWE-266

Supervision and review of access control activities directly detects and remediates improper access configurations or usages.

addresses: CWE-284 CWE-266

Defining account types, requiring approvals for creation, specifying authorizations, monitoring usage, and reviewing accounts directly prevents improper access control by ensuring only authorized accounts exist and are used.

addresses: CWE-266 CWE-284

The control requires explicit definition of separated access authorizations, making incorrect privilege assignments that bundle conflicting duties harder to implement.

addresses: CWE-266 CWE-284

Ensures privileges are assigned only as necessary rather than incorrectly over-granted.

addresses: CWE-284

Device lock enforces restricted access until re-authentication, directly reducing unauthorized use of active sessions.

addresses: CWE-284

Explicitly identifying and documenting actions permitted without identification or authentication enforces proper access control boundaries by defining justified exceptions.

addresses: CWE-284

By automatically labeling outputs with security attributes, the control supports attribute-based enforcement and reduces exploitability of improper access control weaknesses.

MITRE ATT&CK Enterprise TechniquesAI

T1068 Exploitation for Privilege Escalation Privilege Escalation
Adversaries may exploit software vulnerabilities in an attempt to elevate privileges.
T1562.001 Disable or Modify Tools Stealth
Adversaries may modify and/or disable security tools to avoid possible detection of their malware/tools and activities.
Why these techniques?

The CVE describes a local privilege escalation exploit (FocusKiller) against an AV minifilter driver that bypasses access controls on ZwTerminateProcess, directly enabling T1068. The same process-termination capability in security software facilitates T1562.001 by allowing attackers to disable or interfere with defensive tools.

Confidence: HIGH · MITRE ATT&CK Enterprise v18.1

NVD Description

A weakness has been identified in Qi-ANXIN QAX Virus Removal up to 2025-10-22. The affected element is the function ZwTerminateProcess in the library QKSecureIO_Imp.sys of the component Mini Filter Driver. Executing a manipulation can lead to improper access controls. The…

more

attack is restricted to local execution. The exploit has been made available to the public and could be used for attacks. The vendor was contacted early about this disclosure but did not respond in any way.

Deeper analysisAI

CVE-2026-3796 is a vulnerability involving improper access controls in the ZwTerminateProcess function within the QKSecureIO_Imp.sys library of the Mini Filter Driver component in Qi-ANXIN QAX Virus Removal software versions up to 2025-10-22. This weakness allows manipulation that bypasses intended protections, as identified under CWEs 266 (Incorrect Privilege Assignment), 284 (Improper Access Control), and NVD-CWE-Other. The issue carries a CVSS v3.1 base score of 5.3 (AV:L/AC:L/PR:L/UI:N/S:U/C:L/I:L/A:L), indicating moderate severity with local attack vector, low attack complexity, and low privileges required.

Exploitation requires local execution on the affected system, targeting users or processes with low-level privileges. A successful attack can result in limited impacts to confidentiality, integrity, and availability, such as unauthorized termination or interference with processes via the vulnerable driver function. An exploit has been publicly disclosed, hosted on GitHub under the FocusKiller repository, enabling potential attackers to replicate the manipulation.

VulDB advisories detail the vulnerability (CTI ID 349763, submission 758991) and note that the vendor, Qi-ANXIN, was contacted early but provided no response or patch. No official mitigation or update is referenced, leaving affected systems reliant on disabling the Mini Filter Driver, restricting local privileges, or monitoring for FocusKiller exploit usage until vendor action occurs.

The public availability of the FocusKiller exploit on GitHub raises concerns for immediate local privilege escalation risks in environments using the vulnerable QAX Virus Removal software.

Details

CWE(s)

Affected Products

qianxin
qax internet control gateway
≤ 2025-10-22

CVEs Like This One

CVE-2025-8795Shared CWE-266, CWE-284
CVE-2025-2549Shared CWE-266, CWE-284
CVE-2026-2206Shared CWE-266, CWE-284
CVE-2026-2075Shared CWE-266, CWE-284
CVE-2024-13200Shared CWE-266, CWE-284
CVE-2025-2121Shared CWE-266, CWE-284
CVE-2025-0802Shared CWE-266, CWE-284
CVE-2026-5141Shared CWE-266, CWE-284
CVE-2025-54914Shared CWE-284
CVE-2025-21359Shared CWE-284

References