Privilege Escalation Vulnerability in udisks Storage Management Daemon by Red Hat
CVE-2026-26103
7.1HIGH
Key Information:
- Vendor
Red Hat
- Status
- Vendor
- CVE Published:
- 25 February 2026
What is CVE-2026-26103?
A security flaw exists in the udisks storage management daemon, which provides a D-Bus API that lacks proper authorization checks. This vulnerability allows local unprivileged users to command the root-owned udisks daemon to overwrite LUKS encryption metadata on block devices. As a result, sensitive encryption keys may become invalid, and encrypted volumes could be rendered permanently inaccessible. Exploiting this vulnerability may lead to significant denial-of-service conditions due to irreversible data loss.
Affected Version(s)
Red Hat Enterprise Linux 10 0:2.10.90-6.el10_1.1
Red Hat Enterprise Linux 10.0 Extended Update Support 0:2.10.90-5.el10_0.2
References
CVSS V3.1
Score:
7.1
Severity:
HIGH
Confidentiality:
None
Integrity:
High
Availability:
None
Attack Vector:
Local
Attack Complexity:
Low
Privileges Required:
Low
User Interaction:
None
Scope:
Unchanged
Timeline
Vulnerability published
Vulnerability Reserved
Credit
Red Hat would like to thank Asim Viladi Oglu Manizada for reporting this issue.