Логотип exploitDog
Консоль
Логотип exploitDog

exploitDog

redhat логотип

CVE-2026-26103

Опубликовано: 25 фев. 2026
Источник: redhat
CVSS3: 7.1

Описание

A flaw was found in the udisks storage management daemon that exposes a privileged D-Bus API for restoring LUKS encryption headers without proper authorization checks. The issue allows a local unprivileged user to instruct the root-owned udisks daemon to overwrite encryption metadata on block devices. This can permanently invalidate encryption keys and render encrypted volumes inaccessible. Successful exploitation results in a denial-of-service condition through irreversible data loss.

Отчет

The Red Hat Product Security team has rated this vulnerability as Moderate. Exploitation requires local system access but no authentication or user interaction. A successful attack allows an unprivileged user to cause the udisks daemon to overwrite LUKS encryption headers, resulting in loss of data integrity and availability.

Меры по смягчению последствий

Mitigation for this issue is either not available or the currently available options do not meet the Red Hat Product Security criteria comprising ease of use and deployment, applicability to a widespread installation base, or stability.

Затронутые пакеты

ПлатформаПакетСостояниеРекомендацияРелиз
Red Hat Enterprise Linux 6udisksNot affected
Red Hat Enterprise Linux 7udisks2Not affected
Red Hat Enterprise Linux 8udisks2Not affected
Red Hat Enterprise Linux 9udisks2Not affected
Red Hat Enterprise Linux 10udisks2FixedRHSA-2026:347602.03.2026

Показывать по

Дополнительная информация

Статус:

Important
Дефект:
CWE-862
https://bugzilla.redhat.com/show_bug.cgi?id=2433719udisks: Missing Authorization Check Allows Unprivileged Users to Restore LUKS Headers via udisks D-Bus API

7.1 High

CVSS3

Связанные уязвимости

CVSS3: 7.1
ubuntu
около 1 месяца назад

A flaw was found in the udisks storage management daemon that exposes a privileged D-Bus API for restoring LUKS encryption headers without proper authorization checks. The issue allows a local unprivileged user to instruct the root-owned udisks daemon to overwrite encryption metadata on block devices. This can permanently invalidate encryption keys and render encrypted volumes inaccessible. Successful exploitation results in a denial-of-service condition through irreversible data loss.

CVSS3: 7.1
nvd
около 1 месяца назад

A flaw was found in the udisks storage management daemon that exposes a privileged D-Bus API for restoring LUKS encryption headers without proper authorization checks. The issue allows a local unprivileged user to instruct the root-owned udisks daemon to overwrite encryption metadata on block devices. This can permanently invalidate encryption keys and render encrypted volumes inaccessible. Successful exploitation results in a denial-of-service condition through irreversible data loss.

CVSS3: 7.1
debian
около 1 месяца назад

A flaw was found in the udisks storage management daemon that exposes ...

CVSS3: 7.1
github
около 1 месяца назад

A flaw was found in the udisks storage management daemon that exposes a privileged D-Bus API for restoring LUKS encryption headers without proper authorization checks. The issue allows a local unprivileged user to instruct the root-owned udisks daemon to overwrite encryption metadata on block devices. This can permanently invalidate encryption keys and render encrypted volumes inaccessible. Successful exploitation results in a denial-of-service condition through irreversible data loss.

rocky
23 дня назад

Important: udisks2 security update

7.1 High

CVSS3