HomeRedhatCVE-2026-26103

CVE-2026-26103

HIGH
7.1CVSS
Published: 2026-02-25
Updated: 2026-02-27
AI Analysis

Description

A flaw was found in the udisks storage management daemon that exposes a privileged D-Bus API for restoring LUKS encryption headers without proper authorization checks. The issue allows a local unprivileged user to instruct the root-owned udisks daemon to overwrite encryption metadata on block devices. This can permanently invalidate encryption keys and render encrypted volumes inaccessible. Successful exploitation results in a denial-of-service condition through irreversible data loss.

CVSS Metrics

Vector
CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:H/A:H
Attack Vector
local
Complexity
low
Privileges
low
User Action
none
Scope
unchanged
Confidentiality
none
Integrity
high
Availability
high
Weaknesses
CWE-862

Metadata

Primary Vendor
REDHAT
Published
2/25/2026
Last Modified
2/27/2026
Source
NIST NVD
Note: Verify all details with official vendor sources before applying patches.

Affected Products

redhat : enterprise_linuxfreedesktop : udisks

AI-Powered Remediation

Generate remediation guidance or a C-suite brief for this vulnerability.

Executive Intelligence Brief

CVE-CVE-2026-26103 | HIGH Severity | CVEDatabase.com | CVEDatabase.com