CVE-2026-26103

Severity
7.1HIGH
EPSS
0.0%
top 99.08%
CISA KEV
Not in KEV
Exploit
No known exploits
Timeline
PublishedFeb 25

Description

A flaw was found in the udisks storage management daemon that exposes a privileged D-Bus API for restoring LUKS encryption headers without proper authorization checks. The issue allows a local unprivileged user to instruct the root-owned udisks daemon to overwrite encryption metadata on block devices. This can permanently invalidate encryption keys and render encrypted volumes inaccessible. Successful exploitation results in a denial-of-service condition through irreversible data loss.

CVSS vector

CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:H/A:HExploitability: 1.8 | Impact: 5.2

Affected Packages2 packages

Debianudisks2< 2.11.1-1

Also affects: Enterprise Linux 10.0

🔴Vulnerability Details

3
OSV
CVE-2026-26103: A flaw was found in the udisks storage management daemon that exposes a privileged D-Bus API for restoring LUKS encryption headers without proper auth2026-02-25
CVEList
Udisks: missing authorization check allows unprivileged users to restore luks headers via udisks d-bus api2026-02-25
GHSA
GHSA-fw7p-cggr-9xm6: A flaw was found in the udisks storage management daemon that exposes a privileged D-Bus API for restoring LUKS encryption headers without proper auth2026-02-25

📋Vendor Advisories

2
Red Hat
udisks: Missing Authorization Check Allows Unprivileged Users to Restore LUKS Headers via udisks D-Bus API2026-02-25
Debian
CVE-2026-26103: udisks2 - A flaw was found in the udisks storage management daemon that exposes a privileg...2026

🕵️Threat Intelligence

1
Wiz
CVE-2026-26103 Impact, Exploitability, and Mitigation Steps | Wiz
CVE-2026-26103 (HIGH CVSS 7.1) | A flaw was found in the udisks stor | cvebase.io