Monitor vulnerabilities like this one.
Sign up free to get alerted when software you use is affected.
5.5
Unprivileged users can copy LUKS encryption headers from Linux systems
CVE-2026-26104
Summary
A security issue in the Linux system's storage management daemon allows unauthorized users to copy sensitive encryption information. This could allow attackers to gain access to encrypted data. To fix this, update your system's storage management daemon to the latest version.
What to do
No fix is available yet. Check with your software vendor for updates.
Affected software
| Vendor | Product | Affected versions | Fix available |
|---|---|---|---|
| redhat | enterprise_linux | 10.0 | – |
| freedesktop | udisks | 2.0.0 | – |
Original title
A flaw was found in the udisks storage management daemon that allows unprivileged users to back up LUKS encryption headers without authorization. The issue occurs because a privileged D-Bus method ...
Original description
A flaw was found in the udisks storage management daemon that allows unprivileged users to back up LUKS encryption headers without authorization. The issue occurs because a privileged D-Bus method responsible for exporting encryption metadata does not perform a policy check. As a result, sensitive cryptographic metadata can be read and written to attacker-controlled locations. This weakens the confidentiality guarantees of encrypted storage volumes.
nvd CVSS3.1
5.5
Vulnerability type
CWE-862
Missing Authorization
Published: 25 Feb 2026 · Updated: 14 Mar 2026 · First seen: 6 Mar 2026