CVE-2026-26103

7.1 HIGH

📋 TL;DR

A local privilege escalation vulnerability in udisks allows unprivileged users to trigger the root-owned daemon to overwrite LUKS encryption headers. This permanently destroys encryption keys, rendering encrypted volumes inaccessible and causing irreversible data loss. All systems running vulnerable udisks versions with LUKS-encrypted volumes are affected.

💻 Affected Systems

Products:
  • udisks
  • udisks2
Versions: Versions prior to udisks2-2.10.0
Operating Systems: Linux distributions using udisks (RHEL, Fedora, Ubuntu, Debian, etc.)
Default Config Vulnerable: ⚠️ Yes
Notes: Only affects systems with LUKS-encrypted block devices. Systems without encrypted volumes are not vulnerable to data loss.

📦 What is this software?

⚠️ Risk & Real-World Impact

🔴

Worst Case

Complete and permanent loss of all data on LUKS-encrypted volumes, requiring full restoration from backups.

🟠

Likely Case

Targeted destruction of specific encrypted volumes by malicious local users, causing denial of service through data loss.

🟢

If Mitigated

No impact if proper access controls prevent local unprivileged users from interacting with udisks D-Bus interface.

🌐 Internet-Facing: LOW - This is a local privilege escalation requiring local user access.
🏢 Internal Only: HIGH - Any local user account can trigger this, making it dangerous in multi-user environments.

🎯 Exploit Status

Public PoC: ✅ No
Weaponized: LIKELY
Unauthenticated Exploit: ✅ No
Complexity: LOW

Exploitation requires local user access but is straightforward via D-Bus calls. No authentication bypass needed beyond local user privileges.

🛠️ Fix & Mitigation

✅ Official Fix

Patch Version: udisks2-2.10.0 or later

Vendor Advisory: https://access.redhat.com/security/cve/CVE-2026-26103

Restart Required: Yes

Instructions:

1. Update udisks package using your distribution's package manager. 2. Restart the udisks service or reboot the system. 3. Verify the updated version is running.

🔧 Temporary Workarounds

Restrict D-Bus access to udisks

linux

Configure D-Bus policy to restrict which users can call the vulnerable udisks methods

Create /etc/dbus-1/system.d/udisks2.conf with restrictive policies

Disable udisks service

linux

Stop and disable the udisks daemon if not required

systemctl stop udisks2
systemctl disable udisks2

🧯 If You Can't Patch

  • Implement strict access controls to prevent local unprivileged users from accessing the system
  • Monitor D-Bus traffic for suspicious calls to udisks methods related to LUKS header operations

🔍 How to Verify

Check if Vulnerable:

Check udisks version: udisksctl --version or rpm -q udisks2

Check Version:

udisksctl --version || rpm -q udisks2 || dpkg -l | grep udisks2

Verify Fix Applied:

Verify version is 2.10.0 or higher and test that unprivileged users cannot call the vulnerable D-Bus methods

📡 Detection & Monitoring

Log Indicators:

  • D-Bus audit logs showing unauthorized calls to org.freedesktop.UDisks2 methods
  • System logs showing unexpected LUKS header operations

Network Indicators:

  • Not applicable - local attack only

SIEM Query:

source="d-bus" AND method_call="*UDisks2*" AND (user!="root" OR user!="system")

🔗 References

📤 Share & Export