CVE-2026-26104

Severity
5.5MEDIUM
EPSS
0.0%
top 99.00%
CISA KEV
Not in KEV
Exploit
No known exploits
Timeline
PublishedFeb 25

Description

A flaw was found in the udisks storage management daemon that allows unprivileged users to back up LUKS encryption headers without authorization. The issue occurs because a privileged D-Bus method responsible for exporting encryption metadata does not perform a policy check. As a result, sensitive cryptographic metadata can be read and written to attacker-controlled locations. This weakens the confidentiality guarantees of encrypted storage volumes.

CVSS vector

CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:NExploitability: 1.8 | Impact: 3.6

Affected Packages2 packages

Debianudisks2< 2.11.1-1

Also affects: Enterprise Linux 10.0

🔴Vulnerability Details

3
CVEList
Udisks: missing authorization check allows unprivileged users to back up luks headers via udisks d-bus api2026-02-25
OSV
CVE-2026-26104: A flaw was found in the udisks storage management daemon that allows unprivileged users to back up LUKS encryption headers without authorization2026-02-25
GHSA
GHSA-hjgq-ff5j-5v2m: A flaw was found in the udisks storage management daemon that allows unprivileged users to back up LUKS encryption headers without authorization2026-02-25

📋Vendor Advisories

2
Red Hat
udisks: Missing Authorization Check Allows Unprivileged Users to Back Up LUKS Headers via udisks D-Bus API2026-02-25
Debian
CVE-2026-26104: udisks2 - A flaw was found in the udisks storage management daemon that allows unprivilege...2026

🕵️Threat Intelligence

1
Wiz
CVE-2026-26104 Impact, Exploitability, and Mitigation Steps | Wiz
CVE-2026-26104 (MEDIUM CVSS 5.5) | A flaw was found in the udisks stor | cvebase.io