CVE-2026-26103
Severity
7.1HIGH
EPSS
0.0%
top 99.08%
CISA KEV
Not in KEV
Exploit
No known exploits
Affected products
Timeline
PublishedFeb 25
Description
A flaw was found in the udisks storage management daemon that exposes a privileged D-Bus API for restoring LUKS encryption headers without proper authorization checks. The issue allows a local unprivileged user to instruct the root-owned udisks daemon to overwrite encryption metadata on block devices. This can permanently invalidate encryption keys and render encrypted volumes inaccessible. Successful exploitation results in a denial-of-service condition through irreversible data loss.
CVSS vector
CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:H/A:HExploitability: 1.8 | Impact: 5.2
Affected Packages2 packages
Also affects: Enterprise Linux 10.0
🔴Vulnerability Details
3OSV▶
CVE-2026-26103: A flaw was found in the udisks storage management daemon that exposes a privileged D-Bus API for restoring LUKS encryption headers without proper auth↗2026-02-25
CVEList▶
Udisks: missing authorization check allows unprivileged users to restore luks headers via udisks d-bus api↗2026-02-25
GHSA▶
GHSA-fw7p-cggr-9xm6: A flaw was found in the udisks storage management daemon that exposes a privileged D-Bus API for restoring LUKS encryption headers without proper auth↗2026-02-25