Home

Description

A flaw was found in the udisks storage management daemon that allows unprivileged users to back up LUKS encryption headers without authorization. The issue occurs because a privileged D-Bus method responsible for exporting encryption metadata does not perform a policy check. As a result, sensitive cryptographic metadata can be read and written to attacker-controlled locations. This weakens the confidentiality guarantees of encrypted storage volumes.

PUBLISHED Reserved 2026-02-11 | Published 2026-02-25 | Updated 2026-02-25 | Assigner redhat




MEDIUM: 5.5CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N

Problem types

Missing Authorization

Product status

Default status
affected

Default status
unaffected

Default status
unaffected

Default status
unaffected

Default status
unaffected

Timeline

2026-01-28:Reported to Red Hat.
2026-02-25:Made public.

Credits

Red Hat would like to thank Asim Viladi Oglu Manizada for reporting this issue.

References

access.redhat.com/security/cve/CVE-2026-26104 vdb-entry

bugzilla.redhat.com/show_bug.cgi?id=2433717 (RHBZ#2433717) issue-tracking

cve.org (CVE-2026-26104)

nvd.nist.gov (CVE-2026-26104)

Download JSON