Description
The Amazon SageMaker Python SDK before v3.2.0 and v2.256.0 includes the ModelBuilder HMAC signing key in the cleartext response elements of the DescribeTrainingJob function. A third party with permissions to both call this API and permissions to modify objects in the Training Jobs S3 output location may have the ability to upload arbitrary artifacts which are executed the next time the Training Job is invoked.
Published: 2026-02-02
Score: 8.5 High
EPSS: < 1% Very Low
KEV: No
Impact: Remote code execution via exposed HMAC key
Action: Patch Immediately
AI Analysis

Impact

The Amazon SageMaker Python SDK prior to version 3.2.0 and 2.256.0 transmits the ModelBuilder HMAC signing key in clear text as part of the DescribeTrainingJob API response. An attacker who can retrieve this key can sign malicious artifacts and place them in the training job’s S3 output location. When the training job is subsequently invoked, those artifacts are executed, providing a path to arbitrary code execution on the training infrastructure. The vulnerability compromises the confidentiality of the signing key and the integrity of training artifacts, as exemplified by CWE‑319.

Affected Systems

All releases of the AWS SageMaker Python SDK before v3.2.0 and before v2.256.0 are affected. Users deploying this SDK in any environment, including local development, CI/CD pipelines, or on‑premises installations, must verify whether they are using one of these vulnerable releases.

Risk and Exploitability

The CVSS score of 8.5 indicates high severity, and the EPSS score of less than 1% suggests a very low probability of current exploitation. The vulnerability is not listed in the CISA KEV catalog. Exploitation requires an actor to have permissions to call DescribeTrainingJob and to modify objects in the training job's S3 output bucket. If a single identity holds both permissions, the attacker can obtain the key, upload a malicious artifact, and trigger the training job, resulting in code execution on the training environment.

Generated by OpenCVE AI on April 18, 2026 at 14:17 UTC.

Remediation

No vendor fix or workaround currently provided.

OpenCVE Recommended Actions

  • Upgrade the SageMaker Python SDK to v3.2.0 or later, which eliminates the key exposure
  • Separate IAM permissions so that no single entity can both invoke DescribeTrainingJob and write to the job’s S3 output bucket; enforce least‑privilege
  • Audit existing training jobs for unexpected or modified artifacts and monitor the S3 output bucket for abnormal writes

Generated by OpenCVE AI on April 18, 2026 at 14:17 UTC.

Tracking

Sign in to view the affected projects.

Advisories
Source ID Title
Github GHSA Github GHSA GHSA-rjrp-m2jw-pv9c SageMaker Python SDK has Exposed HMAC
History

Wed, 04 Feb 2026 12:30:00 +0000

Type Values Removed Values Added
First Time appeared Amazon
Amazon sagemaker Python Sdk
Vendors & Products Amazon
Amazon sagemaker Python Sdk

Tue, 03 Feb 2026 15:30:00 +0000


Tue, 03 Feb 2026 15:15:00 +0000

Type Values Removed Values Added
Metrics ssvc

{'options': {'Automatable': 'no', 'Exploitation': 'none', 'Technical Impact': 'total'}, 'version': '2.0.3'}


Mon, 02 Feb 2026 23:15:00 +0000

Type Values Removed Values Added
Description The Amazon SageMaker Python SDK before v3.2.0 and v2.256.0 includes the ModelBuilder HMAC signing key in the cleartext response elements of the DescribeTrainingJob function. A third party with permissions to both call this API and permissions to modify objects in the Training Jobs S3 output location may have the ability to upload arbitrary artifacts which are executed the next time the Training Job is invoked.
Title Cleartext transmission of sensitive materials in aws/sagemaker-python-sdk
Weaknesses CWE-319
References
Metrics cvssV3_1

{'score': 7.2, 'vector': 'CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H'}

cvssV4_0

{'score': 8.5, 'vector': 'CVSS:4.0/AV:N/AC:L/AT:N/PR:H/UI:N/VC:H/VI:N/VA:N/SC:H/SI:H/SA:H'}


Subscriptions

Amazon Sagemaker Python Sdk
cve-icon MITRE

Status: PUBLISHED

Assigner: AMZN

Published:

Updated: 2026-02-04T16:28:49.875Z

Reserved: 2026-02-02T18:13:49.829Z

Link: CVE-2026-1777

cve-icon Vulnrichment

Updated: 2026-02-03T15:00:45.722Z

cve-icon NVD

Status : Deferred

Published: 2026-02-02T23:16:04.097

Modified: 2026-04-15T00:35:42.020

Link: CVE-2026-1777

cve-icon Redhat

No data.

cve-icon OpenCVE Enrichment

Updated: 2026-04-18T14:30:02Z

Weaknesses