Cleartext storage of sensitive information in the ModelBuilder/Serve component in Amazon SageMaker Python SDK before v2.257.2 and v3 before v3.8.0 might allow a remote authenticated actor to extract the HMAC signing key from SageMaker API responses and forge valid integrity signatures for specially crafted model artifacts, achieving code execution in inference containers. This issue requires a remote authenticated actor with permissions to call SageMaker describe APIs and S3 write access to the model artifact path.



To remediate this issue, we recommend upgrading to Amazon SageMaker Python SDK v2.257.2 or v3.8.0 and rebuild any models previously created with ModelBuilder using the updated SDK.

Project Subscriptions

Vendors Products
Amazon Sagemaker Python Sdk Subscribe
Advisories

No advisories yet.

Fixes

Solution

No solution given by the vendor.


Workaround

No workaround given by the vendor.

History

Thu, 14 May 2026 20:15:00 +0000

Type Values Removed Values Added
Description Cleartext storage of sensitive information in the ModelBuilder/Serve component in Amazon SageMaker Python SDK before v2.257.2 and v3 before v3.8.0 might allow a remote authenticated actor to extract the HMAC signing key from SageMaker API responses and forge valid integrity signatures for specially crafted model artifacts, achieving code execution in inference containers. This issue requires a remote authenticated actor with permissions to call SageMaker describe APIs and S3 write access to the model artifact path. To remediate this issue, we recommend upgrading to Amazon SageMaker Python SDK v2.257.2 or v3.8.0 and rebuild any models previously created with ModelBuilder using the updated SDK.
Title Cleartext storage of HMAC signing key in Amazon SageMaker Python SDK ModelBuilder/Serve path
First Time appeared Amazon Sagemaker Python Sdk
Amazon Sagemaker Python Sdk aws
Weaknesses CWE-312
CPEs cpe:2.3:a:amazon_sagemaker_python_sdk:aws:*:*:*:*:*:*:*:*
Vendors & Products Amazon Sagemaker Python Sdk
Amazon Sagemaker Python Sdk aws
References
Metrics cvssV3_1

{'score': 7.2, 'vector': 'CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H'}

cvssV4_0

{'score': 8.5, 'vector': 'CVSS:4.0/AV:N/AC:L/AT:N/PR:H/UI:N/VC:H/VI:N/VA:N/SC:H/SI:H/SA:H'}


Projects

Sign in to view the affected projects.

cve-icon MITRE

Status: PUBLISHED

Assigner: AMZN

Published:

Updated: 2026-05-14T19:51:41.804Z

Reserved: 2026-05-14T13:39:22.096Z

Link: CVE-2026-8596

cve-icon Vulnrichment

No data.

cve-icon NVD

Status : Received

Published: 2026-05-14T20:17:21.183

Modified: 2026-05-14T20:17:21.183

Link: CVE-2026-8596

cve-icon Redhat

No data.

cve-icon OpenCVE Enrichment

No data.

Weaknesses