Redhat Vulnerabilities

Comprehensive security vulnerability database for Redhat products

Last updated: Feb 27, 2026
Total CVEs

2

Critical

0

With Exploits

5

Last 30 Days

0

Severity Distribution

Critical0
0%
High2
100%
Medium3
150%
Low1
50%
DescriptionVendor / ProductExploit Status
CVE-2026-09808.8

An attacker with the right permissions can exploit a flaw in the Red Hat Satellite system to run their own code remotely by creating a specially crafted username for the Baseboard Management Controller. This requires the attacker to already have access to create or update hosts within the system.

redhatsatellite
Exploit Available
about 1 month agoFeb 27, 2026
CVE-2026-261037.1

An attacker with local access can exploit a flaw in the udisks storage management tool to overwrite encryption settings on protected drives, potentially making the data permanently inaccessible. This requires no special privileges, meaning any regular user on the system could cause significant data loss and disrupt access to encrypted volumes.

redhatenterprise linux
Exploit Available
about 1 month agoFeb 25, 2026

About Redhat Security

This page tracks all publicly disclosed security vulnerabilities (CVEs) affecting Redhat products. Our database is updated in real-time from the National Vulnerability Database (NVD) and enriched with exploit information from GitHub and other security research sources.

Each CVE listing includes CVSS severity scores, exploit availability status, AI-powered vulnerability summaries, and links to official patches and security advisories.