Description
A flaw was found in the udisks storage management daemon that exposes a privileged D-Bus API for restoring LUKS encryption headers without proper authorization checks. The issue allows a local unprivileged user to instruct the root-owned udisks daemon to overwrite encryption metadata on block devices. This can permanently invalidate encryption keys and render encrypted volumes inaccessible. Successful exploitation results in a denial-of-service condition through irreversible data loss.
Published: 2026-02-25
Score: 7.1 High
EPSS: < 1% Very Low
KEV: No
Impact: Permanently invalidating LUKS encryption keys leading to irreversible data loss
Action: Immediate Patch
AI Analysis

Impact

The udisks storage management daemon exposes a privileged D‑Bus API that permits restoration of LUKS encryption headers without performing an authorization check. An unprivileged user can therefore instruct the root‑owned udisks process to overwrite encryption metadata on any block device, which can permanently invalidate the key used to decrypt that volume. The consequence is a denial‑of‑service that manifests as irrecoverable data loss, because once the header is corrupt the volume can no longer be decrypted and its data becomes inaccessible.

Affected Systems

The vulnerability affects Red Hat Enterprise Linux releases 6, 7, 8, 9, 10, and the 10.0 Extended Update Support line, as well as the freedesktop udisks package version 2.0.0. Systems running any of these operating system releases with the affected udisks package are impacted.

Risk and Exploitability

The vulnerability carries a CVSS score of 7.1 and an EPSS score below 1 %, indicating a high severity and a low probability of exploitation in the wild. The flaw is a local privilege escalation vector, requiring an attacker to have a user account on the system; no network or privileged exploitation is necessary. Interaction with the D‑Bus interface is straightforward, and the lack of an authorization check removes a critical security boundary. The issue is not listed in CISA’s Known Exploited Vulnerabilities catalog, suggesting no documented exploitation as of this analysis.

Generated by OpenCVE AI on April 18, 2026 at 10:45 UTC.

Remediation

Vendor Workaround

Mitigation for this issue is either not available or the currently available options do not meet the Red Hat Product Security criteria comprising ease of use and deployment, applicability to a widespread installation base, or stability.


OpenCVE Recommended Actions

  • Apply the Red Hat security updates RHSA‑2026:3476 and RHSA‑2026:5831 that patch the udisks daemon and address the missing authorization check (CWE‑862).
  • Restart the udisks service to ensure the patched binary is loaded.
  • Ensure regular backups of all encrypted volumes so that if a header restoration accidentally occurs, data can be recovered.
  • There is no official workaround; apply the patch promptly.

Generated by OpenCVE AI on April 18, 2026 at 10:45 UTC.

Tracking

Sign in to view the affected projects.

Advisories

No advisories yet.

History

Wed, 25 Mar 2026 19:00:00 +0000

Type Values Removed Values Added
First Time appeared Redhat enterprise Linux Eus
CPEs cpe:/o:redhat:enterprise_linux_eus:10.0
Vendors & Products Redhat enterprise Linux Eus
References

Fri, 13 Mar 2026 01:00:00 +0000


Mon, 02 Mar 2026 07:45:00 +0000

Type Values Removed Values Added
CPEs cpe:/o:redhat:enterprise_linux:10 cpe:/o:redhat:enterprise_linux:10.1
References

Fri, 27 Feb 2026 03:30:00 +0000

Type Values Removed Values Added
First Time appeared Freedesktop
Freedesktop udisks
CPEs cpe:2.3:a:freedesktop:udisks:2.0.0:*:*:*:*:*:*:*
cpe:2.3:o:redhat:enterprise_linux:10.0:*:*:*:*:*:*:*
Vendors & Products Freedesktop
Freedesktop udisks

Wed, 25 Feb 2026 22:15:00 +0000

Type Values Removed Values Added
Metrics ssvc

{'options': {'Automatable': 'no', 'Exploitation': 'none', 'Technical Impact': 'partial'}, 'version': '2.0.3'}


Wed, 25 Feb 2026 12:15:00 +0000

Type Values Removed Values Added
References
Metrics threat_severity

None

threat_severity

Important


Wed, 25 Feb 2026 10:45:00 +0000

Type Values Removed Values Added
Description A flaw was found in the udisks storage management daemon that exposes a privileged D-Bus API for restoring LUKS encryption headers without proper authorization checks. The issue allows a local unprivileged user to instruct the root-owned udisks daemon to overwrite encryption metadata on block devices. This can permanently invalidate encryption keys and render encrypted volumes inaccessible. Successful exploitation results in a denial-of-service condition through irreversible data loss.
Title Udisks: missing authorization check allows unprivileged users to restore luks headers via udisks d-bus api
First Time appeared Redhat
Redhat enterprise Linux
Weaknesses CWE-862
CPEs cpe:/o:redhat:enterprise_linux:10
cpe:/o:redhat:enterprise_linux:6
cpe:/o:redhat:enterprise_linux:7
cpe:/o:redhat:enterprise_linux:8
cpe:/o:redhat:enterprise_linux:9
Vendors & Products Redhat
Redhat enterprise Linux
References
Metrics cvssV3_1

{'score': 7.1, 'vector': 'CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:H/A:H'}


Subscriptions

Freedesktop Udisks
Redhat Enterprise Linux Enterprise Linux Eus
cve-icon MITRE

Status: PUBLISHED

Assigner: redhat

Published:

Updated: 2026-03-25T18:52:14.387Z

Reserved: 2026-02-11T12:48:26.436Z

Link: CVE-2026-26103

cve-icon Vulnrichment

Updated: 2026-02-25T21:03:08.443Z

cve-icon NVD

Status : Modified

Published: 2026-02-25T11:16:02.983

Modified: 2026-03-25T19:16:47.977

Link: CVE-2026-26103

cve-icon Redhat

Severity : Important

Publid Date: 2026-02-25T06:00:00Z

Links: CVE-2026-26103 - Bugzilla

cve-icon OpenCVE Enrichment

Updated: 2026-04-18T10:45:43Z

Weaknesses